____ can be used to secure portable computers, external hard drives, and other portable pieces of hardware to a table or other object.

A. Surge suppressors
B. Password locks
C. Spike suppressors
D. Cable locks

Answer: D

Computer Science & Information Technology

You might also like to view...

Default programs are associated with which of the following?

A) File folders B) Devices C) Paths D) File types

Computer Science & Information Technology

A(n) ________ is a company that provides Internet service for a fee

Fill in the blank(s) with correct word

Computer Science & Information Technology