The process of obtaining a subject’s proven identity is known as:

a. Enrollment
b. Identification
c. Authentication
d. Authorization


c. Authentication

Computer Science & Information Technology

You might also like to view...

Answer the following questions true (T) or false (F)

1. C accepts any nonzero value as true. 2. The expression ‘e’ < ‘F’ is true in ASCII. 3. In C, the || operator is evaluated before the && operator.

Computer Science & Information Technology

Map elements can be placed anywhere within the body of the Web page because they are not actually displayed by the browser, but used as references for mapping ____ to inline images.

A. hotspots B. image maps C. attributes D. Both A and B

Computer Science & Information Technology

In the Java example, both client and server are dealing with objects, although web services do not support distributed objects. How can this be the case? What are the limitations imposed on the interfaces of Java web services?

What will be an ideal response?

Computer Science & Information Technology

As the Web has branched out in recent years, it has grown to include smaller, handheld devices, which limit the size of the software that can be run on them.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology