_________ audit trails may be used to detect security violations within an application or to detect flaws in the application’s interaction with the system.
A. Application-level B. System-level
C. User-level D. None of the above
A. Application-level
You might also like to view...
It is desirable to develop your programs incrementally. Code a little, test a little. If you do this with virtual functions, you get into trouble. Discuss the problem and the (very simple) solution.
What will be an ideal response?
In the Linux environment, e-mail is ____.
A. boxed B. encapsulated C. segmented D. modular
Use a piece of graph paper to display the following data as a bar chart.
 To draw the bar chart, you should accomplish the following tasks: 1. Determine a scale. • Depending on the size of the small divisions on your graph paper, let a suitable number of divisions represent an appropriate number of million dollars. • Pick a scale so the largest bar will fill about half of the page. This will leave room for labels and titles. 2. Draw the axes. • Leave appropriate margins. • Draw the vertical axis as a line along the left side of the page. • Mark the increments of the scale along the vertical axis (You need to decide what increments are appropriate.) • Draw the horizontal axis as a line along the bottom of the page. 3. Create labels and titles. • Put the units of the scale beside the vertical axis: $ Million. • Put the quarter number beneath the horizontal axis: Qtr1, Qtr2, etc. • Put a title at the top of the graph: XYZ Company Quarterly Earnings. 4. Draw the bars. • Let each vertical bar represent the earnings for one quarter. • The length of each bar should be proportional to the value it represents, according to the scale on the left.
To group objects, you first select them at the same time using the ____ tool.
A. Lasso B. Subselection C. Selection D. Group