It's good practice to provide a(n) ____________ when connecting to anonymous FTP sites.

a. password
b. email address
c. IP address
d. host name


b. email address

Computer Science & Information Technology

You might also like to view...

____ is the primary factor in a physical security plan because it dictates the form of physical access control.

A. Environment B. Control C. Access D. Location

Computer Science & Information Technology

The default name of the first worksheet in an Excel workbook is ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

Having a user logon at a certain time of day, or even within so many seconds or minutes of another event, is known as a(n) _______________ factor.

A. knowledge B. ownership C. temporal D. possession

Computer Science & Information Technology

Anchor points at each end of an open path are called ____.

A. multiple points B. endpoints C. open points D. Axis points

Computer Science & Information Technology