A computer security protocol for logging-in can be considered as the example of the ______ component of an information system.

A computer security protocol for logging-in can be considered as the example of the ______ component of an information system.
Procedure
Well Done. Your Answer is Correct Keep it Up!
Software
Data
Hardware

Leave a Reply

Your email address will not be published. Required fields are marked *