One way to restrict the access to Web pages is to require users to ____ before they can view the pages.

A. register through the Internet
B. register in person
C. log in
D. download a warning page


Answer: C

Computer Science & Information Technology

You might also like to view...

In addition to being able to provide an overall rating of capability maturity, the SSE-CMM can also be used to provide an assessment of which choice below?

A. Audit effectiveness B. Supply chain security C. Process instances D. Management responsibility

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

1. A logic bomb is the event or condition that determines when the payload is activated or delivered. 2. Many forms of infection can be blocked by denying normal users the right to modify programs on the system. 3. A macro virus infects executable portions of code. 4. E-mail is a common method for spreading macro viruses. 5. In addition to propagating, a worm usually carries some form of payload.

Computer Science & Information Technology

Which of the following are the two types of generic hubs used for connecting USB devices?

a. Battery-powered b. Bus-powered c. Solar-powered d. Self-powered

Computer Science & Information Technology

What happens when you deselect the Allow changes by more than one user at the same time option on the Editing tab of the Share Workbook dialog box

A. The workbook returns to unshared status. B. The workbook is nested. C. The workbook is password-protected D. The workbook is saved as a shared workbook.

Computer Science & Information Technology