_________ audit trails may be used to detect security violations within an application or to detect flaws in the application’s interaction with the system.

A. Application-level B. System-level

C. User-level D. None of the above


A. Application-level

Computer Science & Information Technology

You might also like to view...

It is desirable to develop your programs incrementally. Code a little, test a little. If you do this with virtual functions, you get into trouble. Discuss the problem and the (very simple) solution.

What will be an ideal response?

Computer Science & Information Technology

In the Linux environment, e-mail is ____.

A. boxed B. encapsulated C. segmented D. modular

Computer Science & Information Technology

Use a piece of graph paper to display the following data as a bar chart.

![14957|409x113](upload://sMZrlay6080TPUH3TKCm7jVMxpJ.jpeg) To draw the bar chart, you should accomplish the following tasks: 1. Determine a scale. • Depending on the size of the small divisions on your graph paper, let a suitable number of divisions represent an appropriate number of million dollars. • Pick a scale so the largest bar will fill about half of the page. This will leave room for labels and titles. 2. Draw the axes. • Leave appropriate margins. • Draw the vertical axis as a line along the left side of the page. • Mark the increments of the scale along the vertical axis (You need to decide what increments are appropriate.) • Draw the horizontal axis as a line along the bottom of the page. 3. Create labels and titles. • Put the units of the scale beside the vertical axis: $ Million. • Put the quarter number beneath the horizontal axis: Qtr1, Qtr2, etc. • Put a title at the top of the graph: XYZ Company Quarterly Earnings. 4. Draw the bars. • Let each vertical bar represent the earnings for one quarter. • The length of each bar should be proportional to the value it represents, according to the scale on the left.

Computer Science & Information Technology

To group objects, you first select them at the same time using the ____ tool.

A. Lasso B. Subselection C. Selection D. Group

Computer Science & Information Technology