B) a desktop is less likely to be stolen or damaged
There are a lot of rules in computing. The above can be done with authentication exemption.
<h3>What is Authentication exemptions?</h3>
This is a method that helps one to be able to specify a particular group of computers.
Conclusively, This can be done via their Active Directory computer account name or the use of their IP address. Tis does not apply to existing connection security rules.
Learn more about authentication exemption from
brainly.com/question/25739714
Answer:
abacus . Mesopotamia or China, possibly several thousand years BCE. ...
binary math . Pingala, India, 3rd century BCE. ...
punched card . Basile Bouchon, France, 1725. ...
Explanation:
:)