Which of the following is the lowest-privilege account required to install most programs on Windows XP?

a. Admin
b. Standard User
c. Power User
d. Guest


Answer: c. Power User

Computer Science & Information Technology

You might also like to view...

Retinal scanning is an example of ________ authentication

Fill in the blank(s) with correct word

Computer Science & Information Technology

To install Active Directory on a Windows Server 2008 R2, there must be additional disk space of _________________________

a. 100 MB for the Active Directory database and SYSVOL folder, plus at least 100 MB for the transaction log files b. 200 MB for the Active Directory database and SYSVOL folder, plus at least 100 MB for the transaction log files c. 300 MB for the Active Directory database and SYSVOL folder, plus at least 100 MB for the transaction log files d. 500 MB for the Active Directory database and SYSVOL folder, plus at least 100 MB for the transaction log files.

Computer Science & Information Technology

Which perpetrator violates computer or Internet security maliciously for illegal personal gain?

a. A red hat hacker b. A gray hat hacker c. A white hat hacker d. A black hat hacker

Computer Science & Information Technology

Whenever the ____ "hears" a(n) ____ event occur, the listener will perform the ____ method in response to that event.

A. ItemHandler;ItemListener;itemPerformed() B. SceneActivationListener;SceneActivation;sceneActivated() C. EventListener;EventActivation;eventActivated() D. ActionHandler;ActionListener;actionPerformed()

Computer Science & Information Technology