Which of the following security methods is best used to track access to a server room?

a. Key lock
b. Mantrap
c. Biometric lock
d. Sign-in log


Answer: d. Sign-in log

Computer Science & Information Technology

You might also like to view...

Which of the following is NOT true about editing, adding, and deleting records?

A) When you add a record to a form, you are actually adding the record to the table it will be stored in. B) If the table is part of a relationship, referential integrity has not been enforced, and the cascade delete option has been chosen, a record cannot be deleted if there are related records in another table until those records have also been deleted. C) Changes to data are saved automatically. D) Records can be deleted from a single table without additional steps if the table is not part of a relationship.

Computer Science & Information Technology

Animated moviemaking is both processor and memory intensive.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

When a motion path is selected, a faint copy of the object appears at the ending point, indicated by a red ____________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

_______________ is an open source video format developed by Google and used for HTML5 video.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology