To log on to the computer system, enter your ________, which identifies you to the computer or operating system

A) Firstname B) User name C) Lastname D) Password


B

Computer Science & Information Technology

You might also like to view...

Case-based Critical Thinking QuestionsCase 12-2Rosalind wants to add attribute declarations to her DTD, and she turns to you for information about the possible attribute types. Finally, you help Rosalind write the declaration of an attribute named "credits" of an element named "course." This optional attribute should contain character data, and a value of 4 should be used if an attribute value is not specified. Which of the following is an appropriate declaration of this attribute?

A. B. C. D.

Computer Science & Information Technology

Need a central location on the network to share data files. Steps in implementing this data share: The second step would be to create a __ after the share is created on the file server.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A(n) ______is a program or app that provides a scheduling, communication, and document sharing platform for students and teachers.

A. cloud educational platform B. open courseware C. learning management system D. web school system

Computer Science & Information Technology

If you do not know the size of the array needed, you can create an array large enough to hold any number of entries and tell users to enter a predetermined sentinel value after they enter the last value. Using this approach:

A. requires that you increment a counter as values are entered so that you know how many elements are stored in your array B. is preferred to defining a static sized array. C. requires that you dimension the array to hold at least 100 entries. D. requires the array be defined to hold string elements.

Computer Science & Information Technology