Rules that determine who can share network resources are referred to as:

A) protocols B) rules of access C) permissions D) public sharing

C

Computer Science & Information Technology

You might also like to view...

Access can link to a table in all of the following EXCEPT:

A) another Access database. B) SQL and Oracle databases. C) an Excel spreadsheet. D) a Word table.

Computer Science & Information Technology

When a called function completes its task, it normally

a) terminates program execution normally b) aborts program execution c) logs its results d) returns to the calling function

Computer Science & Information Technology