?____ are short words or phrases kept secret by a person and used to gain access to a site or data.

A. ?Usernames
B. Passwords
C. ?PINs
D. ?Bytes


Answer: B

Computer Science & Information Technology

You might also like to view...

In effect, ________ is an operating system in the cloud.

A. IEEE 802.1X B. PaaS C. IaaS D. DHCP

Computer Science & Information Technology

Hashing functions require the use of keys.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

An empty method is called a ____.

A. default method B. predefined method C. stub D. signature

Computer Science & Information Technology

The option to turn on the ruler can be found on the ________ tab

A) Edit B) Insert C) Home D) View

Computer Science & Information Technology