If a user's computer is not equipped with the TPM, how can BitLocker be used?
a. A TPM is not required.
b. With a USB flash drive or smart card.
c. It writes to the BIOS.
d. BitLocker can't be used without a TPM.
B.
You might also like to view...
What is one drawback in using non-integer Step sizes of type Double?
(A) Round-off errors may cause unpredictable results. (B) Non-integer Step sizes are invalid in Visual Basic. (C) A non-integer Step size is never needed. (D) Non-integer Step sizes usually produce infinite loops.
The stack empty operation
A) removes all elements from the stack B) checks to see if there is at least one item on the stack C) destroys the stack and creates a new empty one in its place D) None of the above
Which of the following statements about bottlenecks and saturation is false?
a) Removing a bottleneck will not always result in increased performance. b) When a resource becomes saturated, processes interfere with each other because they must wait for other processes to complete using the resource. c) A virtual memory system that is thrashing is an example of a saturated resource. d) Saturation cannot occur if the system contains sufficient resources to fulfill all incoming requests.
To review a presentation for hidden data or personal information, use the ________
Fill in the blank(s) with correct word