____ usually involves having a software program that monitors every transaction within a system.?
A. ?Firewalling
B. ?Routing
C. ?Access rights
D. ?Computer auditing
Answer: D
Computer Science & Information Technology
You might also like to view...
Access keys can be used with hyperlinks and are particularly helpful to users with impaired motor skills who find it difficult to use a mouse.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
What is the default font size?
A. 10pt B. 11pt C. 12pt D. 14pt
Computer Science & Information Technology