Each time a user logs on locally, which database is used to verify sign-in credentials?

A. SAM
B. SSID
C. SID
D. NID


Answer: A

Computer Science & Information Technology

You might also like to view...

How is the taskbar used in Windows 10?

What will be an ideal response?

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

1. A programmer must have the source code for libraries to extend them, even using inheritance. 2. The programmer only needs the interface, including the type definition to create derived classes to extend an existing library. 3. If class D is derived from class B, we speak of D as the derived class and B as the base class. 4. If class D is derived from class B, then we say that class D inherits from class B. 5. If class D is derived from class B then class D has only some of the members from B, and the additional members defined in D.

Computer Science & Information Technology

What is a prototype and why is it an important tool for system designers?

What will be an ideal response?

Computer Science & Information Technology

Data is said to be ____ if it remains available after the computer is powered off.

A. persistent B. volatile C. fragmented D. temporary

Computer Science & Information Technology