Another name for event logging is

A) Authentication
B) Authorization
C) Encryption
D) None of these are names for event logging.


D

Computer Science & Information Technology

You might also like to view...

The following items are inserted into a binary search tree: 8, 4, 3, 2, 5, 9, 6, 1, 7 . Which item is placed at a root?

a. 1 b. 4 c. 8 d. 9 e. none of the above

Computer Science & Information Technology

____ is achieved by arranging objects so that their visual weight is balanced in the overall composition.

a. Balance b. Rhythm c. Unity d. White space

Computer Science & Information Technology

When you choose to distribute columns in a table, the column ________ is adjusted so that columns are consistent

Fill in the blank(s) with correct word

Computer Science & Information Technology

There is more than one way to rename a worksheet tab

Indicate whether the statement is true or false.

Computer Science & Information Technology