All of the following are methods to protect a computer from theft EXCEPT ________
A) carefully safeguarding a portable computer when traveling
B) placing identification tags on the system unit and monitor
C) securing the computer to the desk or table with cables and locks
D) controlling access to computer labs
B
You might also like to view...
Click the ________ key to move from cell C12 to D12
A) Ctrl B) Shift C) Enter D) Tab
What are the differences between a linked list and a stack?
What will be an ideal response?
____________________ is safe because it tells the active content to display in the Internet zone and not in the Local Machine zone.
Fill in the blank(s) with the appropriate word(s).
Which one of the following types of operating systems would most likely be found on a laptop computer?
A. Desktop operating system B. Mobile operating system C. Server operating system D. Multitasking operating system