A banking app requires stringent access control measures for security reasons. Which of the following techniques could be used to define who can use the app and what actions they can perform?

What will be an ideal response?


Require users to identify themselves using biometrics or passwords.

Computer Science & Information Technology

You might also like to view...

Explain the functions of the MAC sublayer of the Data Link layer.

What will be an ideal response?

Computer Science & Information Technology

You roll a fair die one time. Find the odds in favor of rolling a number less than 6.The odds in favor of rolling a number less than 6 are __________ : __________.

What will be an ideal response?

Computer Science & Information Technology

A _________is a healthcare provider or administrator who is not certified and works under direct supervision of a licensed healthcare provider or office manager

a. Patient care technician b. Physician assistant c. Practice manager d. None of the above

Computer Science & Information Technology

An interface where a user can click a button and change the approach of the whole interface is called a:

a. prototype b. navigation map c. modal interface d. site map e. transitional GUI

Computer Science & Information Technology