Which common attribute of all access controls is used to identify unique records in a set, such as a username?
A) Identification scheme
B) Authentication method
C) Authorization model
D) None of the above
A) Identification scheme
Computer Science & Information Technology
You might also like to view...
When using the Form Tool, a main form and subform will be created if ________ relationship exists
A) a one-to-one B) a many-to-many C) a one-to-many D) any
Computer Science & Information Technology
You are responsible for the design of a communications switch that has to provide 24/7 availability, but which is not safety-critical. Giving reasons for your answer, suggest an architectural style that might be used for this system.
What will be an ideal response?
Computer Science & Information Technology