मराठी
तामिळनाडू बोर्ड ऑफ सेकेंडरी एज्युकेशनएचएससी विज्ञान इयत्ता १२

Which of the following security technique that regulates who can use resources in a computing environment? - Computer Science

Advertisements
Advertisements

प्रश्न

Which of the following security technique that regulates who can use resources in a computing environment?

पर्याय

  • Password

  • Authentication

  • Access control

  • Certification

MCQ

उत्तर

Access control

shaalaa.com
Introduction to Scoping
  या प्रश्नात किंवा उत्तरात काही त्रुटी आहे का?
पाठ 3: Scoping - Evaluation [पृष्ठ २९]

APPEARS IN

सामाचीर कलवी Computer Science [English] Class 12 TN Board
पाठ 3 Scoping
Evaluation | Q 7. | पृष्ठ २९
Share
Notifications

Englishहिंदीमराठी


      Forgot password?
Use app×