单项选择题

A. Secure the PCs to the table with cable locks.
B. Install biometrics to track user access and identities.
C. Install real-time system resource monitoring software.
D. Use security screws to prevent the case from being opened.