What security term defines what resources can be accessed and used?

A) Encryption
B) Authentication
C) Authorization
D) Access level security


C

Computer Science & Information Technology

You might also like to view...

A Double variable can be used in arithmetic operations.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The PROTECT Act retained the statutes of limitations for child abduction or child abuse

Indicate whether the statement is true or false.

Computer Science & Information Technology

If you want to list all the rows in the tables, you do not need to include the word WHERE in a SQL statement.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

In the figure above, the number ____________________ refers to the button you would click to go to Bridge.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology