To solve the problem of two users having the same password, some operating systems keep a third entry for each user in the password file, namely, ____ at which the user created the password.

A. the system
B. the approximate time
C. the system name
D. the exact time


Answer: D

Computer Science & Information Technology

You might also like to view...

Each control element in which the user can enter information is called a(n) ____.

A. field B. index C. value D. area

Computer Science & Information Technology

Suppose class Child is derived from class Parent that was in turn derived from class GrandParent. When we declare an object of class Child, three constructors are called: i) Child, ii) Parent, iii )GrandParent.. What is the order?

a) Child, Parent, GrandParent b) Parent, GrandParent, Child c) GrandParent, Child, Parent d) GrandParent, Parent, Child e) GrandParent, Child, Parent

Computer Science & Information Technology

________ reduce the time it takes to run queries and reports

A) Indexes B) Ideas C) Suggestions D) Recommendations

Computer Science & Information Technology

The lines between the nodes of a tree are called ______.

a) branches b) edges c) arches d) subtrees

Computer Science & Information Technology