If a user's computer is not equipped with the TPM, how can BitLocker be used?

a. A TPM is not required.
b. With a USB flash drive or smart card.
c. It writes to the BIOS.
d. BitLocker can't be used without a TPM.


B.

Computer Science & Information Technology

You might also like to view...

What is one drawback in using non-integer Step sizes of type Double?

(A) Round-off errors may cause unpredictable results. (B) Non-integer Step sizes are invalid in Visual Basic. (C) A non-integer Step size is never needed. (D) Non-integer Step sizes usually produce infinite loops.

Computer Science & Information Technology

The stack empty operation

A) removes all elements from the stack B) checks to see if there is at least one item on the stack C) destroys the stack and creates a new empty one in its place D) None of the above

Computer Science & Information Technology

Which of the following statements about bottlenecks and saturation is false?

a) Removing a bottleneck will not always result in increased performance. b) When a resource becomes saturated, processes interfere with each other because they must wait for other processes to complete using the resource. c) A virtual memory system that is thrashing is an example of a saturated resource. d) Saturation cannot occur if the system contains sufficient resources to fulfill all incoming requests.

Computer Science & Information Technology

To review a presentation for hidden data or personal information, use the ________

Fill in the blank(s) with correct word

Computer Science & Information Technology