____ governs what an authenticated user is allowed to do.

A. Authentication
B. Encryption
C. Access management
D. Authorization


Answer: D

Computer Science & Information Technology

You might also like to view...

Siri, the personal assistant app on the Apple iOS operating system, is an example of _______ recognition software.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The most basic element of a PowerPoint presentation is a ________

A) table B) sheet C) slide D) page

Computer Science & Information Technology

In what situations must you use a macro instead of a module?

What will be an ideal response?

Computer Science & Information Technology

A class X has 12 operations. Cyclomatic complexity has been computed for all operations in the OO system, and the average value of module complexity is 4. For class X, the complexity for operations 1 to 12 is 5, 4, 3, 3, 6, 8, 2, 2, 5, 5, 4, 4, respectively. Compute the weighted methods per class.

What will be an ideal response?

Computer Science & Information Technology