1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lara31 [8.8K]
3 years ago
14

Terminal resource security is a software feature that erases the screen and signs a user off automatically after a specified len

gth of inactivity.A. TrueB. False
Computers and Technology
1 answer:
zepelin [54]3 years ago
4 0

Answer: True.

Explanation:

Terminal resource security is the type of security that automatically logs out it user due to a period of inactivity. Setting up a password for a terminal resource security requires combining characters, symbols and numbers, it must be noted that how vulnerable the system will be is determined by the strength of it password.

There are certain programs that still grant access to their users during certain time of inactivity, this is mainly to reduce the cases of break-in attempts during time off.

You might be interested in
Due to the difficult economic times, increased global competition, demand for customization, and increased consumer sophisticati
Lunna [17]

Answer:

b. False

Explanation:

Difficult economic times, increased global competition, demand for customization, and increased consumer sophistication does not direct companies to hire more employees and outsource middle managers.

Rather, companies tend to invest new technologies, information systems to satisfy the needs in global competition, consumer sophistication and customization.

Middle managers outsourced cannot deal these issues effectively, therefore they need to be company employees.  

In difficult economic times, companies does not want to hire extra employees because of increased cost.

8 0
3 years ago
Choose the response that best completes the following statement.
slava [35]

Answer:

consider the outcome

Explanation:

7 0
2 years ago
Which of the following tools might the security administrator use to perform further security assessment of this issue?
Y_Kistochka [10]

Answer:

A.Port scanner

Explanation:

thats correct answer★

4 0
2 years ago
Where is voice data stored in Android?
Dafna1 [17]
Inside its internal hard-drive and your google account!
8 0
2 years ago
What programs are most likely affected by a macro virus?
Iteru [2.4K]

Answer:

Macro viruses usually infect Microsoft Office apps like Word and Excel.

Explanation:

7 0
2 years ago
Other questions:
  • The Internet Engineering Task Force (IETF) defines the protocols and standards for how the Internet works. The members of the IE
    12·1 answer
  • What will you better be prepared for by learning about the animals you photograph
    11·1 answer
  • Read the argument below and determine the underlying principle that was used to come to the conclusion presented: It is recommen
    5·1 answer
  • Python 3.8.2 detais
    15·1 answer
  • Why are Quick Parts useful in an Outlook message?
    5·1 answer
  • Edhesive assignment 1 movie ratings
    9·1 answer
  • What is the decimal value for the jump control?
    12·1 answer
  • Selah infects the ads on a website that users from her target company frequently visit with malware as part of her penetration t
    10·1 answer
  • When you use the predict step in the IPDE process you
    8·1 answer
  • An independent penetration testing company is invited to test a company's legacy banking application developed for Android phone
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!