When a user locks a computer and walks away, and then wants access, he needs _______

a. An administrator to provide access
b. His password to unlock the computer
c. His username and password to unlock the computer
d. To reset his password


B.

Computer Science & Information Technology

You might also like to view...

If a derived class inherits from two base classes that both define a certain member function, then an ambiguity problem will arise when:

a. An object of a base class calls that certain member function. b. An object of the derived class calls that certain member function. c. A pointer of a base class type pointing to an object of the derived class calls that certain member function. d. None of the above.

Computer Science & Information Technology

After the following program is finished, how many bytes are written to the file t.dat?

``` import java.io.*; public class Test { public static void main(String[] args) throws IOException { DataOutputStream output = new DataOutputStream( new FileOutputStream("t.dat")); output.writeShort(1234); output.writeShort(5678); output.close(); } }``` a. 2 bytes. b. 4 bytes. c. 8 bytes. d. 16 bytes.

Computer Science & Information Technology

In Excel, the Page Layout button is found in the ________ group on the View tab

A) Zoom B) Workbook Views C) Show D) Window

Computer Science & Information Technology

HIDPSs are also known as system integrity verifiers.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology