The action that is taken by a subject over an object is called a(n):

A. authorization
B. access
C. control
D. operation


Answer: D

Computer Science & Information Technology

You might also like to view...

Every Java program needs a method named main().

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

File names can contain up to ________ characters

A) 255 B) 150 C) 100 D) 50

Computer Science & Information Technology

What utility is used to verify that TCP/IP installed, bound to the NIC, configured correctly, and communicating with the network?

a. traceroute b. ifconfig c. ping d. route

Computer Science & Information Technology

A subclass can use attributes from a(n) ____ class if those attributes were defined in the subclass.

A. inheriting B. disseminating C. distributing D. base

Computer Science & Information Technology