There are six categories of security services: authenticiation, access control, data confidentiality, data integrity, nonrepudiation, and availability service. First, is authentication service, which defines as the assurance that the communicator is legitimate and is the one that it claims to be. It can either be peer entity or data origin authentication. Second, access control which is to prevent any unauthorized uses of resources. After one is being authenticiated, then this service limit/controls who access? what accessing rights to the resources are allowed depending on the identified individuals. Data confifentiality: the protection of data from unauthorized disclosure. Data integrity: the assurance that data received are exactly as sent by an authorized entity (e.t.c, contain no modificafion, insertion, deletion, or replay).
<em>The answer is D.
</em>
<em>
</em>
<em>It can be presented using Visual Flow such as ER Diagram to show relationships of child record and the object. ER Diagram or Entity Relationship Diagram are graphical charts that is showing how entities such as child, parents and other objects/ persons and how they could be related from one another. Relationships can be one to one, one to many, many to one and many to many.</em>
Answer:
The search bars in search engines to find the most reliable information.
Explanation:
You right click the mouse. hope this helps