Most mobile devices allow the user to set a(n) _______________ by using a password, PIN, pattern, fingerprint, and/or facial recognition to block strangers from accessing the device.

A. screen lock
B. permissions policy
C. device reset
D. data cleanup


Answer: A

Computer Science & Information Technology

You might also like to view...

Method ________ adds a node, or collection of nodes, as children of the given node.

a) Add b) XAdd c) AddChildren d) XAddChildren

Computer Science & Information Technology

After you right-click an icon on the desktop, you can do all of the following EXCEPT _____.

A. change the icon B. display the properties C. rename an icon D. delete an icon

Computer Science & Information Technology

By default, a movie starts to play as soon as it opens in the Flash Player.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The Towers of Hanoi puzzle is attributed to the French mathematician Edouard Lucas and is based on a legend about a temple in Vietnam, with 64 golden discs stacked on three posts.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology