Which of the following is a private combination of characters associated with a user name that allows access to certain computer resources?

A. folder
B. password
C. user name
D. cipher

Answer: B

Computer Science & Information Technology

You might also like to view...

What should security policies encompass to help mitigate the threat of convergence?

a. Data networks only. b. Voice networks only. c. Both voice and data networks. d. Neither voice nor data networks.

Computer Science & Information Technology

When calling a JavaScript function, you provide in your call ____.

A. the function name B. the parameters C. both a and b D. none of the above

Computer Science & Information Technology