Role hierarchies make use of the concept of __________ to enable one role to implicitly include access rights associated with a subordinate role.
Fill in the blank(s) with the appropriate word(s).
inheritance
Computer Science & Information Technology
You might also like to view...
Security awareness training should be:
a. Mandatory for information workers only b. Optional c. Provided at the time of hire and annually thereafter d. Provided at the time of hire
Computer Science & Information Technology
A(n) ________ is a piece of hardware that executes a set of machine-language instructions.
a) controller b) bus c) processor d) motherboard
Computer Science & Information Technology