A key design principle (оr frаud cоntrоl) is ____________________________________. Applied to а business, someone who requests а computer cannot also sign for it, nor should they directly receive the computer. This prevents the user from requesting many computers, and claiming they never arrived. Applied to an OS, certain roles have different levels of trust than normal users. In particular, administrators are different to normal users. In general, administrators should not be users of the application. What security design principle is being described?