____ are rules that limit access to directories and files.
A. Encryption protocols
B. Passwords
C. User rights
D. Authentication protocols
Answer: C
Computer Science & Information Technology
You might also like to view...
The value of =C3+C4+C5+C6+C7+C8+C9 can be calculated by using ________
A) =SUM(C3...C9 ) B) =TOTAL(C3...C9 ) C) =TOTAL(C3:C9 ) D) =SUM(C3:C9)
Computer Science & Information Technology
What is the “three-clicks” rule?
What will be an ideal response?
Computer Science & Information Technology