__________ locks can be changed after they are put in service, allowing for combination or key changes without a locksmith and even allowing the owner to change to another access method (key or combination) to upgrade security.

A. Programmable
B. Manual
C. Biometric
D. Electronic

Answer: A

Computer Science & Information Technology

You might also like to view...

The ________ Formula tool shows exactly how a formula executes so that you can compare actual execution to the way you know or think the formula should work

A) Evaluate B) Analyze C) Review D) Interpret

Computer Science & Information Technology

A company has several public conference room areas with exposed network outlets. In the past, unauthorized visitors and vendors have used the outlets for internet access. The help desk manager does not want the outlets to be disabled due to the number of training sessions in the conference room and the amount of time it takes to get the ports either patched in or enabled. Which of the following is the best option for meeting this goal?

A. Flood guards B. Port security C. 802.1x D. Loop protection E. IPSec

Computer Science & Information Technology