Several computers in your organization are being used from within the building after hours when the company is closed. Your manager has asked you to configure the computers to limit access to business hours.
 
Which of the following steps can be taken to limit access to the computers?

A. Configure logon time restrictions.
B. Set the BIOS to automatically power off the computers at closing time.
C. Disable Microsoft account resources.
D. Change the user account passwords.


Answer: A

Computer Science & Information Technology

You might also like to view...

The ___________ statement in a called function passes the value of an expression back to the calling function.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A list or table used to create a PivotTable or PivotChart report that comes from an Excel list or external database is called ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

The most common judicial challenges facing computer crime investigators include inconsistent interpretations and applications of the First, Second, and Thirteenth Amendments to emerging advancements in technology

Indicate whether the statement is true or false.

Computer Science & Information Technology

The header element includes links to other pages within a website.?

Answer the following statement true (T) or false (F)

Computer Science & Information Technology