Before users can be given access to a computer and its data, they must in some way prove that they are who they claim to be.This process of providing proof is known as ____.
A. authorization
B. encryption
C. cryptography
D. authentication
Answer: D
Computer Science & Information Technology
You might also like to view...
Which of the following is considered an example of probable cause?
a. Law enforcement's personal observation. b. Criminal profiling. c. Reliable hearsay d. All of the above.
Computer Science & Information Technology
________ references allow formulas and functions to utilize data from cells and cell ranges across worksheets
Fill in the blank(s) with correct word
Computer Science & Information Technology
You can use ____ for standard input in C.
A. scanf() B. read() C. cin D. cout
Computer Science & Information Technology
A Flash movie name cannot start with a(n) number.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology