Role-based access controls are a type of ____ access controls.
A. mandatory
B. nondiscretionary
C. discretionary
D. task-based
Answer: B
You might also like to view...
Companies supplying software that runs from the Internet are referred to as ______________________________.
Fill in the blank(s) with the appropriate word(s).
Consider the algorithm for consensus in a synchronous system, which uses the following integrity definition: if all processes, whether correct or not, proposed the same value, then any correct process in the decided state would chose that value. Now consider an application in which correct processes may propose different results, e.g., by running different algorithms to decide which action to take in a control system’s operation. Suggest an appropriate modification to the integrity definition and thus to the algorithm.
What will be an ideal response?
Removable circuit boards that add new peripherals or increase a computer's capabilities are ________
A) expansion cards B) IrDA ports C) connectivity ports D) motherboards
Which e-mail program comes with Microsoft Office?
A) Outlook Express B) Office Notes C) Outlook D) Eudora