Role hierarchies make use of the concept of __________ to enable one role to implicitly include access rights associated with a subordinate role.

Fill in the blank(s) with the appropriate word(s).

inheritance

Computer Science & Information Technology

You might also like to view...

Security awareness training should be:

a. Mandatory for information workers only b. Optional c. Provided at the time of hire and annually thereafter d. Provided at the time of hire

Computer Science & Information Technology

A(n) ________ is a piece of hardware that executes a set of machine-language instructions.

a) controller b) bus c) processor d) motherboard

Computer Science & Information Technology