Number and name system uses to identify user is called

A. user identification

B. operating identification

C. system identification

D. temporary identification

You can do it
  1. Set of programs with full set of documentation is considered as
  2. Function of running and loading programs and usage of peripherals is function of
  3. Types of software programs usually includes
  4. Programs written by programmer to help computer users are considered as
  5. In microcomputers - operating system is usually stored on
  6. Number and name system uses to identify user is called
  7. Software which controls general operations of computer system is classified as
  8. Library program may comes from
  9. Program provides users with grid of rows and columns is classified as
  10. Commercial organization specializing preparation and design of software package is classified as
  11. Slots in spreadsheet that can be copied to other slots are classified as
  12. Program which exactly perform operations that manual says is classified as
  13. Program produces experimental results for biologist research is classified as
  14. System program which performs one simple task is classified as
  15. System programs examples includes
  16. Program packages that allows program users to design data files and select information are called
  17. System software's are supplied by the
  18. Typing of words on keyboard to drive program with help of
  19. Slots in spreadsheet whose formula is not exactly copied are classified as
  20. Process of checking software suitability for any particular application is classified as
  21. Several programs run at same time and storage is shared especially in
  22. Special set of characters that computer associates with specific user identification is classified as
  23. Program which is used to produce pictures and text and to organize it in newspaper is classified as
  24. Application program example includes
  25. Program used to transfer contents onto a printer from VDU screen is classified as
  26. Set of software authorized to specific users is considered as
  27. Application program used with all documentation is considered
  28. Set of software is held central by
  29. If program can cope data errors - program is called
  30. Process to exit from computer by giving correct instructions such as 'EXIT' is classified as