Page 1 of 1

The following is an access verification technique, listing several users and the access allowed for File_13. For a throu

Posted: Fri Jul 08, 2022 7:26 am
by answerhappygod
The following is an access verification technique, listingseveral users and the access allowed for File_13. For a through d,identify the control technique used here. For each, explain thetype of access allowed. Finally, describe who is included in theWORLD category. a. User_10 R-E- b. User_14R-ED c. User_17 RWE- d. WORLDR---