To help prevent unauthorized access to PCs, a security administrator implements screen savers that lock the PC after five minutes of inactivity. Which of the following controls is being described in this situation?
A. Management
B. Administrative
C. Technical
D. Operational
Answer: C. Technical
You might also like to view...
A workbook is defined as
A) similar to a spreadsheet but bound rather than electronic. B) a file containing related worksheets. C) an un-editable "picture" of data. D) the address of the current cell.
Match the following terms with their descriptions:I.Data validationII.Validation textIII.Validation RuleIV.Default valueV.Input Mask WizardA.Provides custom error message when incorrect data is enteredB.Value entered automatically when a record is createdC.A setting that limits what values can be entered in a fieldD.Set of rules that help control the accuracy of data entryE.Tool used to help create consistent formatting of data
Fill in the blank(s) with the appropriate word(s).
Workgroup computing is also referred to as _________ computing.
Fill in the blank(s) with the appropriate word(s).
If the organization has the need to store far more data than any single server can accommodate, and wishes to survive a network disaster, they will deploy server redundancy.
a. true b. false