Many websites, like that in the accompanying figure, require a user to enter a private combination of characters associated with a user name that allows access to certain computer resources. What is the term for this combination of characters?

A. PIN
B. password
C. secure key
D. passterm


Answer: B

Computer Science & Information Technology

You might also like to view...

A potential weakness in an asset or its defensive control system(s) is known as a(n) ?_________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Operational feasibility is an assessment of whether the organization can acquire the technology necessary to implement and support the proposed control.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Word's Picture button is found in the Illustrations group on the Insert tab

Indicate whether the statement is true or false

Computer Science & Information Technology

The primary instant messenger ________ are IRC, ICQ, and XMPP

a. Passwords b. Sites c. Protocols d. None of the above

Computer Science & Information Technology