All of the following are methods to protect a computer from theft EXCEPT ________

A) carefully safeguarding a portable computer when traveling
B) placing identification tags on the system unit and monitor
C) securing the computer to the desk or table with cables and locks
D) controlling access to computer labs

B

Computer Science & Information Technology

You might also like to view...

When a record is added, edited or deleted using a form, the underlying table(s) are automatically updated and do not need to be saved

Indicate whether the statement is true or false

Computer Science & Information Technology

If grade has the value of 60, what will the following code display? if (grade >= 60) { cout <<"Passed";

a. nothing. b. 60 c. Passed d. cout <<"Passed";

Computer Science & Information Technology