Multiple Choice
Limiting user access to the system is considered what type of design activity?
A) User interface design
B) Security and controls design
C) Describing the environment
D) Application components design
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q54: Since the design activities all interact with
Q55: It is just as important to have
Q56: A deployment diagram is most useful for
Q57: Three types of users that are considered
Q58: Symmetric key encryption uses a public key
Q60: A major comparison between analsys and design
Q61: In user interface design the detailed screen
Q62: List the five primary activities that are
Q63: During analysis,analysts build models to represent the
Q64: Database design is somewhat of a stand-alone