What are the two general approaches for controlling user authorization for the use of a technology?
A. profile lists and configuration tables
B. firewall rules and access filters
C. user profiles and filters
D. access control lists and capability tables
Answer: D
You might also like to view...
A(n) ________ is a synonym or another name for the element, used by different users of systems.
A) alias B) schema C) alert D) varchar
In order to view a zipped file, you must ________ the file
A) extract B) save C) compress D) view
Individual values or categories in a pie chart can be emphasized by ________ the chosen pie slice
Fill in the blank(s) with correct word
Match the following terms with their description
I. Application software II. ARM device III. Gesture IV. GUI V. Icon A. Uses a different processor than most personal computers B. A program that helps a user perform specific tasks C. Allows a user to perform an action like zooming D. Small image that represents a program, file, or website E. An interface that uses icons