Before users can be given access to a computer and its data, they must in some way prove that they are who they claim to be.This process of providing proof is known as ____.
A. authorization
B. encryption
C. cryptography
D. authentication
Answer: D
You might also like to view...
Using a computer to forecast future sales and order more inventory before a shortage can occur is an example of information system feedback.
Answer the following statement true (T) or false (F)
____ is a distance-vector routing protocol that broadcasts entire routing tables to neighbors every 30 seconds, out of every interface.
A. RIP B. OSPF C. BGP D. EIGRP
The Unified Modeling Language (UML) uses a set of symbols to represent graphically the _____ within a system.
A. ?feasibility B. ?accuracy C. ?components D. ?relationships
Page breaks within block elements can often leave behind _____, which is a fragment of text left dangling at the top of page.?
A. ?lags B. ?orphans C. ?widows D. ?gaps