What is the most common tool used to restrict access to a computer system
(A) User logins
(B) Passwords
(C) Computer keys
(D) Access-control software
Share this... |
![]() Facebook
|
![]() Twitter
|
![]() Linkedin
|
![]() Whatsapp
|
Your email address will not be published. Required fields are marked *