The type of computer-based access control that involves a process that uses secret or hidden information in order to retrieve particular data items is:

a. puzzles
b. vaults
c. islands
d. patterns


Ans: a. puzzles

Computer Science & Information Technology

You might also like to view...

A function object is

A) an instance of a class that has exactly one member function and no member variables. B) an object of a class that has any number of member functions, but no member variables. C) an object of a class that overloads the function call operator (). D) an object that has a member variable that is a pointer to a function. E) None of the above

Computer Science & Information Technology

Where is the name of a file stored?

What will be an ideal response?

Computer Science & Information Technology

Explain in words what the following

``` XSL template accomplishes

```

Computer Science & Information Technology

A(n) ________ is used to query unrelated tables or queries and combine the results into a single dataset. This type of query is different from querying related tables as it combines two SQL SELECT statements

A) crosstab query B) SQL query C) subquery D) union query

Computer Science & Information Technology