____ can be used to secure portable computers, external hard drives, and other portable pieces of hardware to a table or other object.
A. Surge suppressors
B. Password locks
C. Spike suppressors
D. Cable locks
Answer: D
Computer Science & Information Technology
You might also like to view...
Default programs are associated with which of the following?
A) File folders B) Devices C) Paths D) File types
Computer Science & Information Technology
A(n) ________ is a company that provides Internet service for a fee
Fill in the blank(s) with correct word
Computer Science & Information Technology