If you don't want to use BitLocker to protect your computer, you can still configure a power-on password using which of the following?
A. Windows POP technology
B. the BIOS
C. a feature available on some DVD drives
D. your USB keyboard
Answer: B
You might also like to view...
A ___________ statement terminates the current iteration of a loop.
a. Break b. Continue c. Switch d. Assert
List and describe the three components of high availability you learned about in this chapter.
What will be an ideal response?
Cryptographic algorithms in which the message’s sender and receiver both hold an iden- tical key are called ________.
Fill in the blank(s) with the appropriate word(s).
Critical Thinking QuestionsCase 1-1Sally is a busy real estate agent looking to purchase a new desktop computer so she can keep track of her client's accounts and touch-up photos of real estate properties.Sally decides that she will buy a desktop computer for her office as well as a mobile device for use on the road. For the desktop computer, she is trying to decide on an access provider, but she is unclear about the terminology and what she would get with each kind of provider. What can you tell her?
What will be an ideal response?