To help prevent unauthorized access to PCs, a security administrator implements screen savers that lock the PC after five minutes of inactivity. Which of the following controls is being described in this situation?

A. Management
B. Administrative
C. Technical
D. Operational


Answer: C. Technical

Computer Science & Information Technology

You might also like to view...

A workbook is defined as

A) similar to a spreadsheet but bound rather than electronic. B) a file containing related worksheets. C) an un-editable "picture" of data. D) the address of the current cell.

Computer Science & Information Technology

Match the following terms with their descriptions:I.Data validationII.Validation textIII.Validation RuleIV.Default valueV.Input Mask WizardA.Provides custom error message when incorrect data is enteredB.Value entered automatically when a record is createdC.A setting that limits what values can be entered in a fieldD.Set of rules that help control the accuracy of data entryE.Tool used to help create consistent formatting of data

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Workgroup computing is also referred to as _________ computing.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

If the organization has the need to store far more data than any single server can accommodate, and wishes to survive a network disaster, they will deploy server redundancy.

a. true b. false

Computer Science & Information Technology