On tablets and smartphones, what feature can be used that can erase the contents of the device if lost or stolen?

A. encryption
B. tracking
C. remote wipe
D. lock screen


Answer: C

Computer Science & Information Technology

You might also like to view...

Suppose we have an integer data member in a class called errorCode. There is also a function of a class called getError. Since the client cannot understand what the integer value means in the errorCode, the getError function returns a string that gives the meaning of the current integer value. This is an example of:

A. a const reference function B. a const function C. data translation D. poor programming practice

Computer Science & Information Technology

A three-phase commit protocol has the following parts:

Phase 1: is the same as for two-phase commit. Phase 2: the coordinator collects the votes and makes a decision; if it is No, it aborts and informs participants that voted Yes; if the decision is Yes, it sends a preCommit request to all the participants. participants that voted Yes wait for a preCommit or doAbort request. They acknowledge preCommit requests and carry out doAbort requests. Phase 3: the coordinator collects the acknowledgments. When all are received, it Commits and sends doCommit to the participants. participants wait for a doCommit request. When it arrives they Commit. Explain how this protocol avoids delay to participants during their ‘uncertain’ period due to the failure of the coordinator or other participants. Assume that communication does not fail.

Computer Science & Information Technology

The ________ command removes selected text or graphics from your presentation and places it in the Clipboard

Fill in the blank(s) with correct word

Computer Science & Information Technology

When bullets are applied to a paragraph, a first line indent and a(n) ________ indent are applied

Fill in the blank(s) with correct word

Computer Science & Information Technology