Regarding JAAS, the term ____ is used to represent a name associated with a subject.
A. Subject
B. Resource
C. Credential
D. Principal
Answer: D
Computer Science & Information Technology
You might also like to view...
XML elements _________________.
a) cannot begin with “xml” b) cannot begin with any combination of uppercase and lowercase of “xml” c) can begin with “xml” d) a and b
Computer Science & Information Technology
Draw a use case and write up a use case scenario for getting two or three email accounts. Think aBout the steps that are needed to ensure security.\
The use case scenario follows.
Computer Science & Information Technology
The Excel Web App ________ tab includes these commands: Refresh Selected Connection, Refresh All Connections, Calculate Workbook, Sort Ascending, and Sort Descending
A) INSERT B) FORMULAS C) HOME D) DATA
Computer Science & Information Technology
The most economically damaging kinds of computer crime are e-mail viruses.
a. true b. false
Computer Science & Information Technology