____ can be used to secure portable computers, external hard drives, and other portable pieces of hardware to a table or other object.
A. Surge suppressors
B. Password locks
C. Spike suppressors
D. Cable locks
Answer: D
You might also like to view...
To _________________________ is a mouse operation in which you move the mouse until the pointer on the desktop is positioned on the item of choice.
Fill in the blank(s) with the appropriate word(s).
The frequency distribution technique:
a. Searches sequentially through a table to find the matching values and then counts them. b. Uses an input value to count the number of equivalent values. c. Uses the value of an element of one array as the element number of another array and then increments the value found in that element number. d. Uses a cross tabulation method of counting the frequency of numbers.
A sparkline is a tiny table used to show data trends
Indicate whether the statement is true or false
A(n) ________ column in an Excel table uses a single formula that adjusts for each row
Fill in the blank(s) with the appropriate word(s).