Case-Based Critical Thinking QuestionsCase 9-1Melissa is the network administrator for a small publishing company. As network administrator, she is in charge of maintaining the security of all the computers that are part of the company’s network.

Melissa has set up procedures so that every user using a computer connected to the network needs to enter his or her ____, which appears as asterisks on the screen as it is being entered.

A. private key
B. e-mail address
C. public key
D. password

Answer: D

Computer Science & Information Technology

You might also like to view...

?Suppose you wish to inspect the packets of data that are coming in from the Internet into your organization's network.  You should use _______.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A frequently-used transition effect makes bulleted list items glide onto a slide one by one under the control of the person delivering the presentation.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology