The principle of limiting users' access privileges to the specific information required to perform their assigned tasks is known as need-to-know. __________

Answer the following statement true (T) or false (F)

True

Computer Science & Information Technology

You might also like to view...

You must replace your ________ if a severe power surge melts its backup fuse

Fill in the blank(s) with correct word

Computer Science & Information Technology

Explain why constraint checking is usually deferred in transaction processing applications.

What will be an ideal response?

Computer Science & Information Technology