Before users can be given access to a computer and its data, they must in some way prove that they are who they claim to be.This process of providing proof is known as ____.

A. authorization
B. encryption
C. cryptography
D. authentication


Answer: D

Computer Science & Information Technology

You might also like to view...

Using a computer to forecast future sales and order more inventory before a shortage can occur is an example of information system feedback.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

____ is a distance-vector routing protocol that broadcasts entire routing tables to neighbors every 30 seconds, out of every interface.

A. RIP B. OSPF C. BGP D. EIGRP

Computer Science & Information Technology

The Unified Modeling Language (UML) uses a set of symbols to represent graphically the _____ within a system.

A. ?feasibility B. ?accuracy C. ?components D. ?relationships

Computer Science & Information Technology

Page breaks within block elements can often leave behind _____, which is a fragment of text left dangling at the top of page.?

A. ?lags B. ?orphans C. ?widows D. ?gaps

Computer Science & Information Technology