________defines what resources a person can access

a. Authorization
b. Authentication
c. Securitization
d. None of the above


B. Authorization occurs after a user is authenticated.

Computer Science & Information Technology

You might also like to view...

The rules of the Visual Basic language are called its ____.

A. parts B. order C. definitions D. syntax

Computer Science & Information Technology

A computer is intelligent if it acts enough like a _______ to deceive a _______.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A fill that has a 100 % transparency is opaque

Indicate whether the statement is true or false

Computer Science & Information Technology

The ROUND function is which type of function?

A) Math & Trig B) Statistical C) Logical D) Financial

Computer Science & Information Technology