Harry would like to access a document owned by Sally stored on a file server. Applying the subject/object model to this scenario, who or what is the object of the resource request?
A. Harry
B. Sally
C. File server
D. Document
Answer: D. Document
Computer Science & Information Technology
You might also like to view...
Tables are the primary Object in Access because managers use them to create data tables and link to tables in a company's RDBMS
Indicate whether the statement is true or false
Computer Science & Information Technology
Ann a network administrator has been tasked with strengthening the authentication of users logging into systems in area containing sensitive information. Users log in with usernames and passwords, following by a retinal scan. Which of the following could she implement to add an additional factor of authorization?
A. Requiring PII usage B. Fingerprint scanner C. Magnetic swipe cards D. Complex passphrases
Computer Science & Information Technology