Which file system enables administrators to assign permissions to control access to network resources including encryption?
A) FAT32
B) EFS
C) CDFS
D) NTFS
D
Computer Science & Information Technology
You might also like to view...
A program can create a named pipe by calling
A. pipe B. mkfifo
Computer Science & Information Technology
____ emphasize the flow of control and data among the things in the system being modeled.
A. Interaction diagrams B. Sequence diagrams C. Structure diagrams D. Behavior diagrams
Computer Science & Information Technology
The ________ function displays the item with the lowest value and can be used with text data only in Design view
A) Minimum B) Median C) Maximum D) Average
Computer Science & Information Technology
In the ________ you can choose between a Scenario summary, which displays the data in a table or a Scenario PivotTable report
A) Scenario Summary dialog box B) Evaluate Formula dialog box C) Scenario Manager D) Solver
Computer Science & Information Technology