____ are the specific instructions entered into a security system to regulate how it reacts to the data it receives.
A. Access control matrices
B. Capability rules
C. Configuration rules
D. Access control lists
Answer: C
Computer Science & Information Technology
You might also like to view...
MC Two or more fields that form the primary key are referred to as the________primary key.
a) multiple. b) compound. c) duplicate. d) None of the above.
Computer Science & Information Technology
PowerPoint 2016 does not allow you to _________________________ text around a picture or other graphic.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
A ________ chart is used to show comparison among related data
A) line B) pyramid C) column D) pie
Computer Science & Information Technology
A(n) _______ offers password protection and entertainment for today's computer users, but on older computers, it was used to prevent an image from burning into the screen
Fill in the blank(s) with correct word
Computer Science & Information Technology