What are the two general approaches for controlling user authorization for the use of a technology?

A. profile lists and configuration tables
B. firewall rules and access filters
C. user profiles and filters
D. access control lists and capability tables


Answer: D

Computer Science & Information Technology

You might also like to view...

A(n) ________ is a synonym or another name for the element, used by different users of systems.

A) alias B) schema C) alert D) varchar

Computer Science & Information Technology

In order to view a zipped file, you must ________ the file

A) extract B) save C) compress D) view

Computer Science & Information Technology

Individual values or categories in a pie chart can be emphasized by ________ the chosen pie slice

Fill in the blank(s) with correct word

Computer Science & Information Technology

Match the following terms with their description

I. Application software II. ARM device III. Gesture IV. GUI V. Icon A. Uses a different processor than most personal computers B. A program that helps a user perform specific tasks C. Allows a user to perform an action like zooming D. Small image that represents a program, file, or website E. An interface that uses icons

Computer Science & Information Technology