Which of the following key information security principles grants users and systems a predetermined level of access to information resources?
A) Assurance
B) Authentication
C) Authorization
D) Accountability
C) Authorization
You might also like to view...
Because the condition is tested before the loop is repeated, what is another term for the While instruction?
b. Infinite loop c. Post test loop d. Pretest loop e. None of these
The copy constructor for a class is called
a. when an object of the class is passed by value to a function. b. when an object of the class is initialized by another object of the class c. when a function returns an object of the class d. all of the above
In a database, the term ________ is synonymous with a category of information
A) row B) table C) field D) record
What is step 1 when using the Form Wizard?
A) Set data entry B) Set up a subform C) Field selection D) Arrange controls