'''''''''''''''''''''''''''''''''''''''''''''''' ' locking.bas ' This example shows how device locking can be ' used to gain exclusive access to a device ''''''''''''''''''''''''''''''''''''''''''''''''