One way to restrict the access to Web pages is to require users to ____ before they can view the pages.
A. register through the Internet
B. register in person
C. log in
D. download a warning page
Answer: C
You might also like to view...
In addition to being able to provide an overall rating of capability maturity, the SSE-CMM can also be used to provide an assessment of which choice below?
A. Audit effectiveness B. Supply chain security C. Process instances D. Management responsibility
Answer the following statements true (T) or false (F)
1. A logic bomb is the event or condition that determines when the payload is activated or delivered. 2. Many forms of infection can be blocked by denying normal users the right to modify programs on the system. 3. A macro virus infects executable portions of code. 4. E-mail is a common method for spreading macro viruses. 5. In addition to propagating, a worm usually carries some form of payload.
Which of the following are the two types of generic hubs used for connecting USB devices?
a. Battery-powered b. Bus-powered c. Solar-powered d. Self-powered
What happens when you deselect the Allow changes by more than one user at the same time option on the Editing tab of the Share Workbook dialog box
A. The workbook returns to unshared status. B. The workbook is nested. C. The workbook is password-protected D. The workbook is saved as a shared workbook.