Role-based access controls are a type of ____ access controls.

A. mandatory
B. nondiscretionary
C. discretionary
D. task-based


Answer: B

Computer Science & Information Technology

You might also like to view...

Companies supplying software that runs from the Internet are referred to as ______________________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Consider the algorithm for consensus in a synchronous system, which uses the following integrity definition: if all processes, whether correct or not, proposed the same value, then any correct process in the decided state would chose that value. Now consider an application in which correct processes may propose different results, e.g., by running different algorithms to decide which action to take in a control system’s operation. Suggest an appropriate modification to the integrity definition and thus to the algorithm.

What will be an ideal response?

Computer Science & Information Technology

Removable circuit boards that add new peripherals or increase a computer's capabilities are ________

A) expansion cards B) IrDA ports C) connectivity ports D) motherboards

Computer Science & Information Technology

Which e-mail program comes with Microsoft Office?

A) Outlook Express B) Office Notes C) Outlook D) Eudora

Computer Science & Information Technology