Which of the following security tools can Jane, a security administrator, use to deter theft?
A. Virtualization
B. Cable locks
C. GPS tracking
D. Device encryption
Answer: B. Cable locks
You might also like to view...
Which of the following is the distance between lines of text in a paragraph?
A) Indentation B) Tab stops C) Alignment D) Line spacing
A(n) ________ is the arrangement of elements, such as title and subtitle text, lists, pictures, tables, charts, shapes, and movies on a slide
A) alignment B) layout C) format D) style
The IRB lets you type in commands and small code snippets and to retrieve immediate results. The IRB command prompt consists of multiple parts separated by a colon as shown here: irb(main):001:0> Which of these parts is incorrectly described below?
A. (main) - Identifies the current class (in this case the main object) B. 001 - A three digit number showing Ruby's version number C. 0 - Represents the current queue depth when working with a class D. > - The end of the command prompt
?The most popular formats for pictures on the web are JPG, GIF, and ____.
A. ?BMP B. ?PNG C. ?TIFF D. ?MP3