The file _____________ is used on web servers to control access to files and sub directories.
a. 401.html
b. .htaccess
c. php.ini
d. httpd.conf
b. .htaccess
Computer Science & Information Technology
You might also like to view...
Importing and exporting data can be prevented by hiding the ________ and Database Tools tabs
A) File B) Navigation Pane C) Create D) External Data
Computer Science & Information Technology
An information security analyst needs to work with an employee who can answer questions about how data for a specific system is used in the business. The analyst should seek out an employee who has the role of:
A. steward B. owner C. privacy officer D. systems administrator
Computer Science & Information Technology