Identify four things that you can do to deter or minimize the impact of theft or intentional damage to your computer?

What will be an ideal response?


1.  Place the file server in a locked room.
2.  Use network drives for user files and back them up on a daily basis.
3.  Use off-site storage for backups.
4.  Set database passwords.
5.  Use encryption.
6.  Use computer locks, especially for laptops.

Computer Science & Information Technology

You might also like to view...

A(n) ____ proof is a copy you look at on the screen.

a. final b. editing c. hard d. soft

Computer Science & Information Technology

An example of a cell ________ is K12

Fill in the blank(s) with correct word

Computer Science & Information Technology

Which of the following lists the prefix (CIDR) format equivalent of 255.255.224.0?

A) /19 B) /20 C) /21 D) /22

Computer Science & Information Technology

To duplicate a slide, in Slide Sorter view, click to select the slide you want to duplicate, click the ____, and then click Duplicate.

A. Paste Button arrow B. Copy Button arrow C. Duplicate Button arrow D. Office Button arrow

Computer Science & Information Technology