Before users can be given access to a computer and its data, they must in some way prove that they are who they claim to be.This process of providing proof is known as ____.

A. authorization
B. encryption
C. cryptography
D. authentication


Answer: D

Computer Science & Information Technology

You might also like to view...

Which of the following is considered an example of probable cause?

a. Law enforcement's personal observation. b. Criminal profiling. c. Reliable hearsay d. All of the above.

Computer Science & Information Technology

________ references allow formulas and functions to utilize data from cells and cell ranges across worksheets

Fill in the blank(s) with correct word

Computer Science & Information Technology

You can use ____ for standard input in C.

A. scanf() B. read() C. cin D. cout

Computer Science & Information Technology

A Flash movie name cannot start with a(n) number.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology