What is the best way to protect against data loss on a stolen Windows 7 personal laptop?

A) Software piracy
B) Spyware
C) Malware
D) Adware


Answer: C) Malware

Computer Science & Information Technology

You might also like to view...

The end of a Java statement is indicated by a ________.

a. bracket (}) b. asterisk (*) c. semicolon (;) d. colon (:)

Computer Science & Information Technology

What does specify in the following statement?

ArrayList nameList = new ArrayList(); a. It specifies that String objects may not be stored in the ArrayList object. b. It specifies that everything stored in the ArrayList object will be converted to a String object. c. It specifies that only String objects may be stored in the ArrayList object. d. It specifies that the ArrayList will be converted to a String array.

Computer Science & Information Technology

UNIX line commands are processed by a command processor or __________ that lies between the user and the kernel.

a. interface b. IOCS c. shell d. BIOS

Computer Science & Information Technology

In the accompanying figure, the item labeled with the number 2 is a ____ field.

A. text box B. check box C. menu D. radio button

Computer Science & Information Technology