The Microsoft utility ____________________ safeguards passwords from cracking activities. This utility encrypts passwords with a 128-bit algorithm, making it very difficult to crack.

Fill in the blank(s) with the appropriate word(s).


SYSKEY

Computer Science & Information Technology

You might also like to view...

Case 21-1 Roger has been recently appointed as a team lead in an IT firm. He often needs to make PowerPoint presentations to discuss the team's progress, project related details, etc. Microsoft PowerPoint is used to present data in a crisp manner. Hence, the software allows a user to add images and other graphics to enhance the visual appeal. ?Roger needs to create a PowerPoint presentation on the process flow followed in his team to complete each task. In this scenario, Roger needs to use the _____ tool to present the process flow using graphics.

A. ?Photo Album B. ?SmartArt C. ?Cascade D. ?Compare

Computer Science & Information Technology

The Compatibility Checker should be run before saving your presentation to an earlier format of PowerPoint

Indicate whether the statement is true or false

Computer Science & Information Technology

The ____ method of the Control class sets the input focus.

A. Select( ) B. Focus( ) C. Set( ) D. Control( )

Computer Science & Information Technology

?Immediately after the breakup of AT&T there were 7 Regional Bell Operating Companies (RBOCs). As of year-end 2009, there are ____________________ RBOCs.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology