Which of the following is a private combination of characters associated with a user name that allows access to certain computer resources?
A. folder
B. password
C. user name
D. cipher
Answer: B
Computer Science & Information Technology
You might also like to view...
What should security policies encompass to help mitigate the threat of convergence?
a. Data networks only. b. Voice networks only. c. Both voice and data networks. d. Neither voice nor data networks.
Computer Science & Information Technology
When calling a JavaScript function, you provide in your call ____.
A. the function name B. the parameters C. both a and b D. none of the above
Computer Science & Information Technology