Most mobile devices allow the user to set a(n) _______________ by using a password, PIN, pattern, fingerprint, and/or facial recognition to block strangers from accessing the device.
A. screen lock
B. permissions policy
C. device reset
D. data cleanup
Answer: A
Computer Science & Information Technology
You might also like to view...
Method ________ adds a node, or collection of nodes, as children of the given node.
a) Add b) XAdd c) AddChildren d) XAddChildren
Computer Science & Information Technology
After you right-click an icon on the desktop, you can do all of the following EXCEPT _____.
A. change the icon B. display the properties C. rename an icon D. delete an icon
Computer Science & Information Technology
By default, a movie starts to play as soon as it opens in the Flash Player.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
The Towers of Hanoi puzzle is attributed to the French mathematician Edouard Lucas and is based on a legend about a temple in Vietnam, with 64 golden discs stacked on three posts.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology