Which of the following is considered a security principal? (Choose all that apply.)
a: Contacts
b: Computer Accounts
c: User Accounts
d: Distribution groups
b: Computer Accounts
c: User Accounts
Computer Science & Information Technology
You might also like to view...
_________________________ allows physical IT resources to provide multiple virtual images of themselves.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
A(n) ________ is a hierarchy of bullets and sub-bullets
A) detail list B) chronological list C) list level D) alphabetic level
Computer Science & Information Technology
________ functions are used to describe a collection of data such as totals, counts, and averages
A) Logical B) Text C) Statistical D) Financial
Computer Science & Information Technology
Information architects work as independent ____________________ or as part of in-house Web design teams.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology