three types of users that are considered in the design of a security system are ____. a. manager user, technical user, and clerical user
b. technical user, authorized user, and privileged user
c. unauthorized user, registered user, and privileged user
d. supervisor user, administration user, and operational user