________ is a security principal.

a) Any user, group, service or computer
b) An administrator with the highest security privileges
c) A Microsoft guideline for maintaining security on a Windows XP system
d) An authentication and authorization agent such as Kerberos or NTLM


a) Any user, group, service or computer

Computer Science & Information Technology

You might also like to view...

When defining your own exception class, you extend an existing exception class. This is an example of:

a. polymorphism b. encapsulation c. inheritance d. all of the above

Computer Science & Information Technology

?The _____ value of the overflow style keeps an element at a specified size, adding scroll bars only as they are needed.

A. ?scroll B. ?visible C. ?auto D. ?hidden

Computer Science & Information Technology

Analyze the following code:

``` public class A extends B { } class B { public B(String s) { } }``` a. The program has a compile error because A does not have a default constructor. b. The program has a compile error because the default constructor of A invokes the default constructor of B, but B does not have a default constructor. c. The program would compile fine if you add the following constructor into A: A(String s) { } d. The program would compile fine if you add the following constructor into A: A(String s) { super(s); }

Computer Science & Information Technology

Write a method called maxOfTwo that accepts two integer parameters and returns the larger of the two.

What will be an ideal response?

Computer Science & Information Technology