____ is the process of verifying that you really are the person who has the right to access a given computer.

Authorization
Authentication
Identity detection
Resource management


Authentication

Computer Science & Information Technology

You might also like to view...

An RTM version of software is often released so users can help debug it

Indicate whether the statement is true or false

Computer Science & Information Technology

An individual could use the ________ tab of the Internet Options dialog box in Internet Explorer to delete temporary Internet files

Fill in the blank(s) with correct word

Computer Science & Information Technology

The Delete key removes characters and spaces to the right of the insertion point

Indicate whether the statement is true or false

Computer Science & Information Technology

In a cell that contains a function, to copy the VALUE to another to cell—rather than the function—use the ________

A) Paste Link command B) Format Painter command C) Paste Special command to display commands for Paste Values D) Paste command

Computer Science & Information Technology