________ are designed to be the first line of defense for users, thus preventing individuals from booting the computer's operating system.
a. Software passwords
b. BIOS passwords
c. CMOS passwords
d. Document passwords
Question 2
An _______detention is less intrusive than an arrest but more intrusive than a Terry sto
Fill in the blank(s) with correct word