What is the driver used with a scanner so that other applications can access the scanner?
A) JPG
B) GIF
C) TWAIN
D) DOC
E) IMG
C
You might also like to view...
Passwords can be hashed using the ________ algorithm.
a) 3DES b) DES c) MD4 d) all of the above
Legal documents must comply with the laws of the ________ or jurisdiction.
Fill in the blank(s) with the appropriate word(s).
____ is the concept of using all or part of a photo for something other than its original purpose.
a. Backgrounding b. Fringing c. File sharing d. Repurposing
A user reports being unable to access a file on a network share. The security administrator determines that the file is marked as confidential and that the user does not have the appropriate access level for that file. Which of the following is being implemented?
A. Mandatory access control B. Discretionary access control C. Rule based access control D. Role based access control