The principle of limiting users' access privileges to the specific information required to perform their assigned tasks is known as need-to-know. __________
Answer the following statement true (T) or false (F)
True
Computer Science & Information Technology
You might also like to view...
You must replace your ________ if a severe power surge melts its backup fuse
Fill in the blank(s) with correct word
Computer Science & Information Technology
Explain why constraint checking is usually deferred in transaction processing applications.
What will be an ideal response?
Computer Science & Information Technology