Which of these is the process of the system giving appropriate resource access to a user?

a. Authentication
b. Authorization
c. Logging in
d. Identification


B.

Computer Science & Information Technology

You might also like to view...

As shown in the accompanying figure, a hollow lock indicates that a layer is _____.



a. preset
b. transparent
c. fully locked
d. partially locked

Computer Science & Information Technology

The ________________ component displays a drop-down list from which the user can make a selection.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Data validation is a ________

A) set of rules or constraints B) set of drop down options C) set of formatting codes D) set of masking characters

Computer Science & Information Technology

What should you do while copying data on a suspect's computer that is still live??

A. ?Open files to view contents. B. ?Make notes regarding everything you do. C. ?Conduct a Google search of unknown extensions using the computer. D. ?Check Facebook for additional suspects.

Computer Science & Information Technology