A formal log-on procedure is the operating system's first line of defense. Explain how this works.

What will be an ideal response?


When the user logs on, he or she is presented with a dialog box requesting the user's ID and password. The system compares the ID and password to a database of valid users. If the system finds a match, then the log-on attempt is authenticated. If, however, the password or ID is entered incorrectly, the log-on attempt fails and a message is returned to the user. The message should not reveal whether the password or the ID caused the failure. The system should allow the user to reenter the log-on information. After a specified number of attempts (usually no more than five), the system should lock out the user from the system.

PTS: 1

Computer Science & Information Technology

You might also like to view...

What fraction of state legislators around the country would be required to ratify a Constitutional amendment in order for it to pass?

What will be an ideal response?

Computer Science & Information Technology

The String method substring returns ________.

a. a char b. a String c. void d. a char[]

Computer Science & Information Technology

On a binary tree, ____ are used to represent conditions.

A. flowlines B. ovals C. diamond boxes D. process rectangles

Computer Science & Information Technology

Which of the following would be matched if you use a Selection filter’s exact match option for the title “Manager”?

What will be an ideal response?

Computer Science & Information Technology