All data inside the computer is stored as
a. words.
b. numbers.
c. signature patterns.
d. cache memory.
B
You might also like to view...
Having too many panels open makes your ____ cluttered and leaves you less room for editing.
A. editing window B. Common toolbar C. workspace D. Toolbox
A closed path creates a shape such as a(n) ____.
a. rectangle b. oval c. triangle d. any of the above
Case-Based Critical Thinking QuestionsCase 3-2Maureen's brother Paul has also been researching cruise ships online and has created his own presentation. Maureen and Paul decide to work together to create a great presentation to show the rest of the family. Paul sends Maureen his slides about offshore excursions and, following the simplest strategy available to her, she ____.
A. embeds them into her presentation B. uses the Reuse Slides task pane to incorporate his slides into her presentation C. copies and pastes his slides into her presentation D. appends them to her presentation
Several computers in your organization are being used from within the building after hours when the company is closed. Your manager has asked you to configure the computers to limit access to business hours. Which of the following steps can be taken to limit access to the computers?
A. Configure logon time restrictions. B. Set the BIOS to automatically power off the computers at closing time. C. Disable Microsoft account resources. D. Change the user account passwords.