A cable lock is

A) A physical security measure using the universal security slot
B) A lock attached internally that contacts and tracks the laptop
C) A special connector used to lock the RJ-45 cable into the laptop
D) A lock found on a notebook motherboard to track the computer


A

Computer Science & Information Technology

You might also like to view...

?To add a footer, the slide number, and the date to slides, you need to open the _________ tab on the Header and Footer dialog box by clicking the Header & Footer button in the Text group on the Insert tab. A. Slides & Handouts B. Slide Show C. Slide Properties D. Slide

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

When creating a business letter, there should be no blank lines between the complimentary closing and the signature line

Indicate whether the statement is true or false

Computer Science & Information Technology

It is not recommended to use the ________ formatting techniques found on the Home tab with PivotTables

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Consider a relation s over the attributes A and B with the following characteristics:

 7,000 tuples with 70 tuples per page  A hash index on attribute A  The values that the attribute A takes in relation s are integers that are uniformly distributed in the range 1 ? 200. (a) Assuming that the aforesaid index on A is unclustered, estimate the number of disk accesses needed to compute the query A=18(s). (b) What would be the cost estimate if the index were clustered?

Computer Science & Information Technology