All of the following are methods to protect a computer from theft EXCEPT ________

A) carefully safeguarding a portable computer when traveling
B) placing identification tags on the system unit and monitor
C) securing the computer to the desk or table with cables and locks
D) controlling access to computer labs


B

Computer Science & Information Technology

You might also like to view...

Click the ________ key to move from cell C12 to D12

A) Ctrl B) Shift C) Enter D) Tab

Computer Science & Information Technology

What are the differences between a linked list and a stack?

What will be an ideal response?

Computer Science & Information Technology

____________________ is safe because it tells the active content to display in the Internet zone and not in the Local Machine zone.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Which one of the following types of operating systems would most likely be found on a laptop computer?

A. Desktop operating system B. Mobile operating system C. Server operating system D. Multitasking operating system

Computer Science & Information Technology