____ is the process of verifying that you really are the person who has the right to access a given computer.

Authorization
Authentication
Identity detection
Resource management


Authentication

Computer Science & Information Technology

You might also like to view...

____ units define a font size using one of five standard units of measurement.

A. Relative B. Absolute C. Standard D. Uppercase

Computer Science & Information Technology

The predominant Gigabit Ethernet standard is __________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Describe some of the methods of the Directory class.

What will be an ideal response?

Computer Science & Information Technology

Use the New from Existing button to open a copy of a selected document.

a. true b. false

Computer Science & Information Technology