The ability to read a file but not make changes.

Answer: Read-only access

Computer Science & Information Technology

You might also like to view...

Which of the following is NOT an authentication method?

A. CAPTCHA B. DoS C. Password D. Physical object

Computer Science & Information Technology

Match each item with a statement below.

A. malicious software designed to perform unauthorized acts on your computer B. a feature in Windows 10 that elevates user privileges only when required C. anti-malware software included with Windows 10 D. a command-line tool that is used to apply, export, or analyze security templates E. a one-way encryption algorithm that creates a unique identifier that can be used to determine whether data has been changed F. A feature in Windows 10 that can encrypt the operating system partition of a hard drive and protect system files from modification G. the security process that records the occurrence of specific operating system events in the Security log H. an encryption technology for individual files and folders that can be enabled by users I. a collection of settings to control password characteristics such as length and complexity

Computer Science & Information Technology