Which of the following locks uses a keypad to control access?

a. Warded lock
b. Tumbler lock
c. Basic combination lock
d. Programmable cipher lock


ANS: D

Computer Science & Information Technology

You might also like to view...

Read the first integer from the user and store it in the int variable x.

Write declarations, statements or comments that accomplish each of the tasks.

Computer Science & Information Technology

Where do changed lines display within a Word document?

A) In a balloon within the left or right margin B) In the right or left margin C) In the Reviewing Pane D) On the Status bar

Computer Science & Information Technology

Which of the following protocols provides encryption to protect the data as it is transmitted over the network?

A. HTTP B. SHTTP C. FTP D. TFTP E. SFTP F. options a and b only G. options c, d, and e only H. options a and c only I. options b and e only J. all of the options

Computer Science & Information Technology

Which of the following is used to embed the MAC address of an Ethernet interface in a corresponding IPv6 address?

A. Subnet B. IANA prefix C. EUI-64 D. Site-local

Computer Science & Information Technology