____ are rules that limit access to directories and files.

A. Encryption protocols
B. Passwords
C. User rights
D. Authentication protocols

Answer: C

Computer Science & Information Technology

You might also like to view...

The value of =C3+C4+C5+C6+C7+C8+C9 can be calculated by using ________

A) =SUM(C3...C9 ) B) =TOTAL(C3...C9 ) C) =TOTAL(C3:C9 ) D) =SUM(C3:C9)

Computer Science & Information Technology

What is the “three-clicks” rule?

What will be an ideal response?

Computer Science & Information Technology