A. User logins
B. Passwords
C. Computer keys
D. Access-control software
Advertisement
Related Mcqs:
- Coded entries which are used to gain access to a computer system are called__________?
- A. Entry codes B. Passwords C. Security commands D. Code words...
- Hardware or software designed to guard against unauthorized access to a computer network is known as a(n)___________?
- A. Hacker-proof program B. Firewall C. Hacker-resistant server D. Encryption safe wall...
- _____________is computer software designed to operate the computer hardware and to provide platform for running application software?
- A. Application software B. System software C. Software D. None of these...
- The process of transferring files from a computer on the Internet to your computer is called_____________?
- A. Downloading B. uploading C. FTP D. JPEG...
- Which part of the computer is directly involved in executing the instructions of the computer program?
- A. The scanner B. The main storage C. The secondary storage D. The processor...
- ____________computer is small general purpose micro computer, but larger than portable computer?
- A. Hybrid B. Digital C. Desktop D. Laptop...
- A(n)_____________is a set of programs designed to manage the resources of a computer, including starting the computer, managing programs, managing memory and coordinating tasks between input and output devices?
- A. application suite B.compiler C. input/output system D. Operating system E. None of these...
- What computer virus holds the record for being the most widespread computer virus?
- A. I Love You B. Nimdad C. Melissa D. Christmas Submitted by: Tasneem Ahmad...
- A program that acts as an intermediary between a user of a computer and the computer hardware:
- A. Utility Software B. Computer Software C. Operating System D. Application Software Submitted by: SUHAIL AHMED KALHORO...
- What type of resource is most likely to be a shared common resource in a computer Network?
- A. Printers B. Speakers C. Floppy disk drives D. None of these...
Advertisement
The correct answer to the question: "What is the most common tool used to restrict access to a computer system?" is "Passwords".
3 Comments
wrong answer:
user logins is the common tool to restrict…..
Only password are not common