The process for which permissions are applied to a user is known as ____.

A. password checking
B. authentication
C. authorization
D. user detection


Answer: C

Computer Science & Information Technology

You might also like to view...

Which of the following terms is NOT used to refer to a part of an XML document?

(A) content (B) element (C) start tag (D) title

Computer Science & Information Technology

How should SQL services be configured with respect to service accounts?

A. use a single managed service account for all services B. use the Authenticated Users account for all services C. use a separate service account for each service D. use the default Windows service account

Computer Science & Information Technology

Display course description, total capacity and number of sections in each course, where there is more than 1 section.

What will be an ideal response?

Computer Science & Information Technology

One way to delete the contents of a cell is to right-click the cell, click on Delete Contents, click on Delete all, and then click OK

Indicate whether the statement is true or false

Computer Science & Information Technology