. . " Track Defects, Execute Tests 3) By creating a list of authorized users and assigning each user a password and user group, you control the kinds of additions and modifications each user makes to the project." . .