English
Tamil Nadu Board of Secondary EducationHSC Science Class 12

Which of the following security technique that regulates who can use resources in a computing environment? - Computer Science

Advertisements
Advertisements

Question

Which of the following security technique that regulates who can use resources in a computing environment?

Options

  • Password

  • Authentication

  • Access control

  • Certification

MCQ

Solution

Access control

shaalaa.com
Introduction to Scoping
  Is there an error in this question or solution?
Chapter 3: Scoping - Evaluation [Page 29]

APPEARS IN

Samacheer Kalvi Computer Science [English] Class 12 TN Board
Chapter 3 Scoping
Evaluation | Q 7. | Page 29
Share
Notifications

Englishहिंदीमराठी


      Forgot password?
Use app×