What are the security values that can be assigned, and what do they mean in terms of manipulating the software?
a) View, Edit, Delete; they dictate the level of access to data and records.
b) Read, Write, Execute; they control file permissions and system operations.
c) Full Control, Modify, Read; they govern user actions and data modifications.
d) Administrator, User, Guest; they designate user roles and administrative privileges.