SURVEY OF OPERATING SYSTEMS
6th Edition
ISBN: 9781260096002
Author: Holcombe
Publisher: RENT MCG
expand_more
expand_more
format_list_bulleted
Expert Solution & Answer
Chapter 2, Problem 1EQ
Explanation of Solution
Requirement of security in automatic login:
Automatic login represents the action where password to unlock the system is automatically displayed but it is hidden, and characters of password are not displayed. User can set auto login option to computer.
- The user sets such option once and password is displayed during every login in the computer.
- Such option allows computer to start quickly and reduces user work.
- There are some reasons where such option is good but it is not secure.
- The computers that contain confidential information and the government agencies should avoid using this option. Because, it requires high level of security.
- There are several steps to set up automatic system login depending on the type of
operating system installed in computer...
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
There are several methods to manage logins. To verify your identity, list everything you've done thus far. What do you think will happen to passwords in the future?
Situations involving false login management should be detailed. Authentication may be done in several ways. Is there a decline in password usage?
A system that uses many methods of authentication is said to use "multi-factor authentication." What percentage of the time do hackers successfully access a compromised account?
Chapter 2 Solutions
SURVEY OF OPERATING SYSTEMS
Ch. 2 - Prob. 1KTQCh. 2 - Prob. 2KTQCh. 2 - Prob. 3KTQCh. 2 - Prob. 4KTQCh. 2 - Prob. 5KTQCh. 2 - Prob. 6KTQCh. 2 - Prob. 7KTQCh. 2 - Prob. 8KTQCh. 2 - Prob. 9KTQCh. 2 - Prob. 10KTQ
Ch. 2 - Prob. 1MCQCh. 2 - This type of annoyance appears uninvited in a...Ch. 2 - With this Windows feature turned on (as it is by...Ch. 2 - Prob. 4MCQCh. 2 - Prob. 5MCQCh. 2 - Prob. 6MCQCh. 2 - Prob. 7MCQCh. 2 - Prob. 8MCQCh. 2 - Prob. 9MCQCh. 2 - Prob. 10MCQCh. 2 - Prob. 11MCQCh. 2 - Prob. 12MCQCh. 2 - Prob. 13MCQCh. 2 - Prob. 14MCQCh. 2 - Prob. 15MCQCh. 2 - Prob. 1EQCh. 2 - Consider the following statement: User Account...Ch. 2 - Why should you disable the Guest account?Ch. 2 - Prob. 4EQCh. 2 - Prob. 5EQ
Knowledge Booster
Similar questions
- Describe a situation in which it is necessary to maintain a phoney login. Identify many methods for authenticating your identity. Is the usage of passwords becoming more archaic?arrow_forwardThere are several methods to manage logins. Record everything you've done so far to verify your identify. What are your thoughts on the future of passwords?arrow_forwardPlease explain what a challenge-response system is and how it authenticates individuals. It is not immediately apparent how this method is more secure than the conventional method of using passwords.arrow_forward
Recommended textbooks for you
- Fundamentals of Information SystemsComputer ScienceISBN:9781337097536Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningEnhanced Discovering Computers 2017 (Shelly Cashm...Computer ScienceISBN:9781305657458Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. CampbellPublisher:Cengage Learning
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning