When you leave your computer at the end of the workday, you should ________ so that no one else can access your desktop or files
Fill in the blank(s) with correct word
log off
Computer Science & Information Technology
You might also like to view...
The function used to get the data at the top (or front) of the stack is called _______.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
What is Abbr element?
What will be an ideal response?
Computer Science & Information Technology
Secure Wi-Fi networks and VPNs use _____ to secure data transferred over a network.
A. ?hotspots B. ?encryption C. ?wireframes D. ?viewports
Computer Science & Information Technology
Which of the following are capable of processing more than 1 quadrillion instructions in a single second?
a. Super computers b. Desktop computers c. Midrange servers d. Notebook computers
Computer Science & Information Technology