Several computers in your organization are being used from within the building after hours when the company is closed. Your manager has asked you to configure the computers to limit access to business hours.
Which of the following steps can be taken to limit access to the computers?
A. Configure logon time restrictions.
B. Set the BIOS to automatically power off the computers at closing time.
C. Disable Microsoft account resources.
D. Change the user account passwords.
Answer: A
Computer Science & Information Technology
You might also like to view...
If the base class contains only abstract method declarations, the base class is used for:
a) implementation inheritance. b) interface inheritance. c) Both. d) Neither.
Computer Science & Information Technology
Designers use ____________________ within paragraphs to aid readability and to indicate relationships among slide elements.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology