__________ locks can be changed after they are put in service, allowing for combination or key changes without a locksmith and even allowing the owner to change to another access method (key or combination) to upgrade security.

A. Programmable
B. Manual
C. Biometric
D. Electronic


Answer: A

Computer Science & Information Technology

You might also like to view...

A color valueis an alphabetic expression that describes the properties of a color.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The Sarbanes-Oxley Act requires archiving a variety of electronic records and protecting the integrity of corporate financial data.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Vulnerabilities are classified based on severity level (low, medium, or high), and the exploit range needs to keep up with the most recently discovered vulnerabilities and exploits.

a. true b. false

Computer Science & Information Technology

In a queue:

a. Data is added to the top and deleted from the bottom. b. Data is added to the bottom and deleted from the top. c. The data in the queue is moved to the top when data is deleted. d. The data in the queue is moved down when data is deleted.

Computer Science & Information Technology