What two important factors does accountability for access control rely on?
A. Identification and authorization
B. Authentication and authorization
C. Identification and authentication
D. Accountability and authentication
Answer: C. Identification and authentication
Computer Science & Information Technology
You might also like to view...
When an exception occurs it is said to have been ________.
a. caught. b. thrown. c. declared. d. handled.
Computer Science & Information Technology
The computer that made personal computing legitimate in business and industry was the ____________
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
Using a ____ statement makes a message appear in the Output panel when you perform an action.
A. trace B. syntax C. debugging D. confirmation
Computer Science & Information Technology
The TODAY() and NOW() functions are updated every time you open or ________ the spreadsheet.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology