You have noticed inappropriate use of computers for gaming and Internet downloads by some employees who come in after hours and on weekends. These employees don't have valid work assignments during these times. You have been asked to devise a solution for these employees that doesn't affect other employees or these employees' computers during working hours. What's the best solution?

a: Install personal firewall software on their computers in an attempt to block the gaming and Internet traffic

b: Request that the Maintenance Department change the locks on their office doors so that they can enter only during prescribed hours.

c: Set the Logon Hours options for their user accounts.

d: Before you leave each evening and before the weekend, disable these employees' accounts and reenable them the next working day.


c: Set the Logon Hours options for their user accounts.

Computer Science & Information Technology

You might also like to view...

You can filter a mail merge recipient list after it has been selected

Indicate whether the statement is true or false

Computer Science & Information Technology

What type of media is used using the 100Base-FX Ethernet standard?

A) MMF B) SMF C) Category 5e D) Category 6a

Computer Science & Information Technology

What virtualization technology makes it possible to avoid overhead associated with software-managed shadow page tables?

A. Time Sliced Prioritization Method (TSPM) B. Second Level Address Translation (SLAT) C. Threaded Input / Output Translation (TIOT) D. Virtual Disk Interface Layer (VDIL)

Computer Science & Information Technology

Normally, Access prohibits the deletion of a record in which the primary key matches a foreign key in another table.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology