A. User logins
B. Passwords
C. Computer keys
D. Access-control software
Related Mcqs:
- Coded entries which are used to gain access to a computer system are called__________?
A. Entry codes
B. Passwords
C. Security commands
D. Code words - Hardware or software designed to guard against unauthorized access to a computer network is known as a(n)___________?
A. Hacker-proof program
B. Firewall
C. Hacker-resistant server
D. Encryption safe wall - _____________is computer software designed to operate the computer hardware and to provide platform for running application software?
A. Application software
B. System software
C. Software
D. None of these - The process of transferring files from a computer on the Internet to your computer is called_____________?
A. Downloading
B. uploading
C. FTP
D. JPEG - Which part of the computer is directly involved in executing the instructions of the computer program?
A. The scanner
B. The main storage
C. The secondary storage
D. The processor - ____________computer is small general purpose micro computer, but larger than portable computer?
A. Hybrid
B. Digital
C. Desktop
D. Laptop - A(n)_____________is a set of programs designed to manage the resources of a computer, including starting the computer, managing programs, managing memory and coordinating tasks between input and output devices?
A. application suite
B.compiler
C. input/output system
D. Operating system
E. None of these - What computer virus holds the record for being the most widespread computer virus?
A. I Love You
B. Nimdad
C. Melissa
D. ChristmasSubmitted by: Tasneem Ahmad
- A program that acts as an intermediary between a user of a computer and the computer hardware:
A. Utility Software
B. Computer Software
C. Operating System
D. Application SoftwareSubmitted by: SUHAIL AHMED KALHORO
- What type of resource is most likely to be a shared common resource in a computer Network?
A. Printers
B. Speakers
C. Floppy disk drives
D. None of these
The correct answer to the question: "What is the most common tool used to restrict access to a computer system?" is "Passwords".
3 Comments
wrong answer:
user logins is the common tool to restrict…..
Only password are not common