Several computers in your organization are being used from within the building after hours when the company is closed. Your manager has asked you to configure the computers to limit access to business hours.
 
Which of the following steps can be taken to limit access to the computers?

A. Configure logon time restrictions.
B. Set the BIOS to automatically power off the computers at closing time.
C. Disable Microsoft account resources.
D. Change the user account passwords.


Answer: A

Computer Science & Information Technology

You might also like to view...

When you create an array and pass it to a function, a pointer is actually passed to the function. Explain how this is the C language’s original call by reference technique.

What will be an ideal response?

Computer Science & Information Technology

Unlike arrays, hashes are limited to storing only numeric and string data.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

System developers use _____ to document and trail program defects, code changes, and replacement code.

A. bug tracking software B. the obstruction generator C. fault promotion analysis D. the defect distribution policy

Computer Science & Information Technology

Dark data centers are an extension of ___________, which allows system administrators to monitor and manage servers using remote control software.

A. colocation B. fuzzy logic C. lights-out management D. none of the above

Computer Science & Information Technology