When you leave your computer at the end of the workday, you should ________ so that no one else can access your desktop or files

Fill in the blank(s) with correct word


log off

Computer Science & Information Technology

You might also like to view...

The function used to get the data at the top (or front) of the stack is called _______.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

What is Abbr element?

What will be an ideal response?

Computer Science & Information Technology

Secure Wi-Fi networks and VPNs use _____ to secure data transferred over a network.

A. ?hotspots B. ?encryption C. ?wireframes D. ?viewports

Computer Science & Information Technology

Which of the following are capable of processing more than 1 quadrillion instructions in a single second?

a. Super computers b. Desktop computers c. Midrange servers d. Notebook computers

Computer Science & Information Technology