Match the following terms to their meanings:
I. Path
II. Trust Center
III. Trusted Source
IV. Append
V. Security Alert
A. person or organization that you know will not send malicious code
B. notification on the message bar of security concerns of a database
C. location of a file or folder on your computer or storage device
D. security feature that checks documents for macros or digital signatures
E. adding new data to a database
C, D, A, E, B
You might also like to view...
List design goals that would be difficult to meet when using a closed architecture with many layers, such as the OSI example depicted in Figure 6-10.
What will be an ideal response?
Describe each of the following four kinds of access control mechanisms in terms of (a) ease of determining authorized access during execution, (b) ease of adding access for a new subject, (c) ease of deleting access by a subject, and (d) ease of creating a new object to which all subjects by default have access. • Per-subject access control list (that is, one list for each subject tells all the
objects to which that subject has access) • Per-object access control list (that is, one list for each object tells all the subjects who have access to that object) • Access control matrix • Capability What will be an ideal response?
The setcookie() function has no required arguments.
Answer the following statement true (T) or false (F)
The electronic components of most digital devices are mounted on a circuit board called a ______________.
A. system board B. motherboard C. main board D. all of the above