Which file system enables administrators to assign permissions to control access to network resources including encryption?

A) FAT32
B) EFS
C) CDFS
D) NTFS


D

Computer Science & Information Technology

You might also like to view...

A program can create a named pipe by calling

A. pipe B. mkfifo

Computer Science & Information Technology

____ emphasize the flow of control and data among the things in the system being modeled.

A. Interaction diagrams B. Sequence diagrams C. Structure diagrams D. Behavior diagrams

Computer Science & Information Technology

The ________ function displays the item with the lowest value and can be used with text data only in Design view

A) Minimum B) Median C) Maximum D) Average

Computer Science & Information Technology

In the ________ you can choose between a Scenario summary, which displays the data in a table or a Scenario PivotTable report

A) Scenario Summary dialog box B) Evaluate Formula dialog box C) Scenario Manager D) Solver

Computer Science & Information Technology