Three types of users that are considered in the design of a security system are ____
a. manager user, technical user, and clerical user
b. technical user, authorized user, and privileged user
c. unauthorized user, registered user, and privileged user
d. supervisor user, administration user, and operational user
c
You might also like to view...
If you theoretically took multiple samples and plotted the sample percentage, p, for all these samples as a frequency distribution, it would approximate a bell-shaped curve called the ________
A) sampling distribution B) standard error C) limit D) confidence interval E) variability
Beth recently opened an embroidery business and has four employees who work full-time for her. Which of the following will Beth most likely use to manage her company's human resources tasks?
A) manual HR system B) automated HR system C) HR outsourcer system D) HR scorecard system