All of the following are methods to protect a computer from theft EXCEPT ________
A) carefully safeguarding a portable computer when traveling
B) placing identification tags on the system unit and monitor
C) securing the computer to the desk or table with cables and locks
D) controlling access to computer labs
B
Computer Science & Information Technology
You might also like to view...
When a record is added, edited or deleted using a form, the underlying table(s) are automatically updated and do not need to be saved
Indicate whether the statement is true or false
Computer Science & Information Technology
If grade has the value of 60, what will the following code display? if (grade >= 60) { cout <<"Passed";
a. nothing. b. 60 c. Passed d. cout <<"Passed";
Computer Science & Information Technology