________ is a process where authentication and permission will be passed on from one system to another, usually across multiple enterprises, reducing the number of authentications needed by the user.

A. Integration B. Registration

C. Synchronization D. Federation


D. Federation

Computer Science & Information Technology

You might also like to view...

In the digital signature algorithm the user's __________ is represented by x, which is a random or pseudorandom integer with 0 < x < q.

A. per message secret number B. private key C. global key D. public key

Computer Science & Information Technology

Any type of RAM will work in your computer

Indicate whether the statement is true or false

Computer Science & Information Technology

Use the Shift key to select various files or folder that are not adjacent

Indicate whether the statement is true or false

Computer Science & Information Technology

Which of the following browsers supports the web font format "Embedded OpenType"??

A. ?Safari B. ?Internet Explorer (IE) C. ?Chrome D. ?Firefox

Computer Science & Information Technology