____ can be used to secure portable computers, external hard drives, and other portable pieces of hardware to a table or other object.

A. Surge suppressors
B. Password locks
C. Spike suppressors
D. Cable locks


Answer: D

Computer Science & Information Technology

You might also like to view...

To _________________________ is a mouse operation in which you move the mouse until the pointer on the desktop is positioned on the item of choice.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The frequency distribution technique:

a. Searches sequentially through a table to find the matching values and then counts them. b. Uses an input value to count the number of equivalent values. c. Uses the value of an element of one array as the element number of another array and then increments the value found in that element number. d. Uses a cross tabulation method of counting the frequency of numbers.

Computer Science & Information Technology

A sparkline is a tiny table used to show data trends

Indicate whether the statement is true or false

Computer Science & Information Technology

A(n) ________ column in an Excel table uses a single formula that adjusts for each row

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology