Which of the following security chips does BitLocker utilize?

A. BIOS
B. CPU
C. CMOS
D. TPM


Ans: D. TPM

Computer Science & Information Technology

You might also like to view...

Answer the following questions true (T) or false (F)

1. True/False: In a storage location of 8 bits, a sign-and-magnitude integer could be any integer from 0 to 15, inclusive. 2. True/False: The range of integers that can be stored in one’s complement format is exactly double the range that can be stored in sign-and-magnitude format. 3. True/False: Oneproblem with using one’s complement to store integers is that there are two ways to represent 0 .

Computer Science & Information Technology

Which of the following is not a rule that must be followed when naming identifiers?

a. After the first character, you may use the letters a-z, A-Z, an underscore, a dollar sign, or the digits 0-9. b. Identifiers can contain spaces. c. Uppercase and lowercase characters are distinct. d. The first character must be one of the letters a-z, A-Z, an underscore, or a dollar sign.

Computer Science & Information Technology

A primary benefit of creating a PivotTable is that you can rearrange or ________ fields to view and summarize data from different perspectives

Fill in the blank(s) with correct word

Computer Science & Information Technology

In early Windows systems there were no user accounts, and permissions on a share could be set to one of two levels. What were these two levels? (Select all that apply)

A. File Scan B. Read Only C. Full Control D. Write Only E. Both B and C

Computer Science & Information Technology