A formal log-on procedure is the operating system's first line of defense. Explain how this works.

What will be an ideal response?

When the user logs on, he or she is presented with a dialog box requesting the user's ID and password. The system compares the ID and password to a database of valid users. If the system finds a match, then the log-on attempt is authenticated. If, however, the password or ID is entered incorrectly, the log-on attempt fails and a message is returned to the user. The message should not reveal whether the password or the ID caused the failure. The system should allow the user to reenter the log-on information. After a specified number of attempts (usually no more than five), the system should lock out the user from the system.

PTS: 1

Computer Science & Information Technology

You might also like to view...

You can create First-Line indents from the PAGE LAYOUT tab

Indicate whether the statement is true or false

Computer Science & Information Technology

An alternative method to using the negative sign to make the result positive is to use the ABS function

Indicate whether the statement is true or false

Computer Science & Information Technology