________defines what resources a person can access
a. Authorization
b. Authentication
c. Securitization
d. None of the above
B. Authorization occurs after a user is authenticated.
Computer Science & Information Technology
You might also like to view...
The rules of the Visual Basic language are called its ____.
A. parts B. order C. definitions D. syntax
Computer Science & Information Technology
A computer is intelligent if it acts enough like a _______ to deceive a _______.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
A fill that has a 100 % transparency is opaque
Indicate whether the statement is true or false
Computer Science & Information Technology
The ROUND function is which type of function?
A) Math & Trig B) Statistical C) Logical D) Financial
Computer Science & Information Technology