________ is the process of assessing the identity of each individual claiming to have permission to use a resource.

A. Auditing
B. Authentication
C. Authorizations
D. Availability


B. Authentication

Computer Science & Information Technology

You might also like to view...

____ establishes standards for communications between file servers and client software applications.

A. TCP B. HTTP C. IP D. HTCP

Computer Science & Information Technology

Sentinels are data values used to signal either the start or the end of a data series.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

COGNITIVE ASSESSMENT If you are looking to use a Bluetooth device and do not want to extend its range with additional equipment, which of the following is the approximate distance you can expect between your device and the device with which it is transmitting data?

A. 3 feet B. 13 feet C. 33 feet D. 44 feet

Computer Science & Information Technology

A(n) star network uses a number of different connections between network devices so that data can take any of several possible paths from source to destination. _________________________

Answer the following statement true (T) or false (F)

Computer Science & Information Technology