The action that is taken by a subject over an object is called a(n):
A. authorization
B. access
C. control
D. operation
Answer: D
Computer Science & Information Technology
You might also like to view...
Every Java program needs a method named main().
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
File names can contain up to ________ characters
A) 255 B) 150 C) 100 D) 50
Computer Science & Information Technology
What utility is used to verify that TCP/IP installed, bound to the NIC, configured correctly, and communicating with the network?
a. traceroute b. ifconfig c. ping d. route
Computer Science & Information Technology
A subclass can use attributes from a(n) ____ class if those attributes were defined in the subclass.
A. inheriting B. disseminating C. distributing D. base
Computer Science & Information Technology