___________ provides us with the means to trace activities in our environment back to their source.
A. Accountability
B. Authentication
C. Access
D. Nonrepudiation
E. Authorization
Answer: A. Accountability
Computer Science & Information Technology
You might also like to view...
If a table has been created in a database, then a subsequent attempt to create the same table in the same database will
a) create a new table with ‘(2)’ at the end of the table name b) replace the initial table. c) fail with an exception. d) remove all of the elements from the initial table e) None of these is correct
Computer Science & Information Technology
?Avideo embedded on a web page is a(n) _____ and has properties such as source of the video file or the width and height of the video player.
A. ?class B. ?method C. ?object D. ?event
Computer Science & Information Technology