Single_______ systems allow users to login once with a single password.
a) password.
b) sign-on.
c) task.
d) None of the above.
b) sign-on.
You might also like to view...
The weakest aspect of password-based security is
a. the encryption technique used b. the type of key chosen c. the user’s management of their password information d. the algorithm used
MIME was designed for
a. text-based electronic mail b. electronic mail with attached files c. network management d. transferring files
When working with a computer illiterate user over the phone, what is NOT a good practice?
A. frequently ask the customer to tell you what is displayed on the screen B. don't ask the customer to perform a task that might destroy data C. before proceeding with the call, tell the customer to put someone else on the line D. provide step-by-step mouse and keyboard instructions
A missing Alt tag for a graphic is detected by the ________ feature
A) Protect Presentation B) Check Compatibility C) Check Accessibility D) Document Inspector