Which of the following security tools can Jane, a security administrator, use to deter theft?

A. Virtualization
B. Cable locks
C. GPS tracking
D. Device encryption


Answer: B. Cable locks

Computer Science & Information Technology

You might also like to view...

Which of the following is the distance between lines of text in a paragraph?

A) Indentation B) Tab stops C) Alignment D) Line spacing

Computer Science & Information Technology

A(n) ________ is the arrangement of elements, such as title and subtitle text, lists, pictures, tables, charts, shapes, and movies on a slide

A) alignment B) layout C) format D) style

Computer Science & Information Technology

The IRB lets you type in commands and small code snippets and to retrieve immediate results. The IRB command prompt consists of multiple parts separated by a colon as shown here:       irb(main):001:0>       Which of these parts is incorrectly described below?

A. (main) - Identifies the current class (in this case the main object) B. 001 - A three digit number showing Ruby's version number C. 0 - Represents the current queue depth when working with a class D. > - The end of the command prompt

Computer Science & Information Technology

?The most popular formats for pictures on the web are JPG, GIF, and ____.

A. ?BMP B. ?PNG C. ?TIFF D. ?MP3

Computer Science & Information Technology