हिंदी
तमिलनाडु बोर्ड ऑफ सेकेंडरी एज्युकेशनएचएससी विज्ञान कक्षा १२

Which of the following security technique that regulates who can use resources in a computing environment? - Computer Science

Advertisements
Advertisements

प्रश्न

Which of the following security technique that regulates who can use resources in a computing environment?

विकल्प

  • Password

  • Authentication

  • Access control

  • Certification

MCQ

उत्तर

Access control

shaalaa.com
Introduction to Scoping
  क्या इस प्रश्न या उत्तर में कोई त्रुटि है?
अध्याय 3: Scoping - Evaluation [पृष्ठ २९]

APPEARS IN

सामाचीर कलवी Computer Science [English] Class 12 TN Board
अध्याय 3 Scoping
Evaluation | Q 7. | पृष्ठ २९
Share
Notifications

Englishहिंदीमराठी


      Forgot password?
Use app×