A formal log-on procedure is the operating system's first line of defense. Explain how this works.
What will be an ideal response?
When the user logs on, he or she is presented with a dialog box requesting the user's ID and password. The system compares the ID and password to a database of valid users. If the system finds a match, then the log-on attempt is authenticated. If, however, the password or ID is entered incorrectly, the log-on attempt fails and a message is returned to the user. The message should not reveal whether the password or the ID caused the failure. The system should allow the user to reenter the log-on information. After a specified number of attempts (usually no more than five), the system should lock out the user from the system.
PTS: 1
You might also like to view...
What fraction of state legislators around the country would be required to ratify a Constitutional amendment in order for it to pass?
What will be an ideal response?
The String method substring returns ________.
a. a char b. a String c. void d. a char[]
On a binary tree, ____ are used to represent conditions.
A. flowlines B. ovals C. diamond boxes D. process rectangles
Which of the following would be matched if you use a Selection filter’s exact match option for the title “Manager”?
What will be an ideal response?