The type of computer most vulnerable to theft is a ________
A) microcomputer B) portable computer C) desktop computer D) minicomputer
B
You might also like to view...
_____ involves measuring system performance by tracking the number of errors encountered, the amount of memory required, the amount of processing or CPU time needed, and other performance indicators.
Fill in the blank(s) with the appropriate word(s).
Case-Based Critical Thinking QuestionsCase 6-1James is setting up user accounts on his new computer. He would like to create several accounts with different privileges. Answer the questions James asks himself. James wants to be responsible for changing any settings, accessing and changing any other users' accounts, installing software and hardware, and accessing all files on a computer. What type of user account should he set up?
A. standard user B. administrator C. guest D. manager
With ____________________ authentication, the firewall enables the authenticated user to access the desired resources for a specific period of time.
Fill in the blank(s) with the appropriate word(s).
What requires the user's password along with another physical device for authentication?
A. encryption B. cleint side validation C. server side validation D. two-factor authentication