The local library has several public desktops and is co...
A. Secure the PCs to the table with cable locks.
B. Install biometrics to track user access and identities.
C. Install real-time system resource monitoring software.
D. Use security screws to prevent the case from being opened.