Single_______ systems allow users to login once with a single password.

a) password.
b) sign-on.
c) task.
d) None of the above.


b) sign-on.

Computer Science & Information Technology

You might also like to view...

The weakest aspect of password-based security is

a. the encryption technique used b. the type of key chosen c. the user’s management of their password information d. the algorithm used

Computer Science & Information Technology

MIME was designed for

a. text-based electronic mail b. electronic mail with attached files c. network management d. transferring files

Computer Science & Information Technology

When working with a computer illiterate user over the phone, what is NOT a good practice?

A. frequently ask the customer to tell you what is displayed on the screen B. don't ask the customer to perform a task that might destroy data C. before proceeding with the call, tell the customer to put someone else on the line D. provide step-by-step mouse and keyboard instructions

Computer Science & Information Technology

A missing Alt tag for a graphic is detected by the ________ feature

A) Protect Presentation B) Check Compatibility C) Check Accessibility D) Document Inspector

Computer Science & Information Technology