A ____ is a representation of the security policy of the OS.
A. security plan
B. security tree
C. security infrastructure
D. security model
Answer: D
You might also like to view...
_________ can be restored from a backup
A) Tables B) Queries C) Macros D) All database objects
Field name display in database objects such as datasheets, forms, and reports is determined by the ____________________ property.
Fill in the blank(s) with the appropriate word(s).
Which of the following could be a major concern for implementing cloud computing for business-critical services?
A. Incompatible software, hardware, or operating systems. B. Being charged for computing services that go unused. C. A cloud provider’s inability to scale up or down. D. An intermittent or unavailable Internet connection.
The _____ _____ interface lets users interact with menus and icons to carry out functions of the computer.
Fill in the blank(s) with the appropriate word(s).