1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Zepler [3.9K]
3 years ago
11

How can security professionals use software to recover stolen laptops ?

Computers and Technology
1 answer:
inna [77]3 years ago
3 0

<u>Answer is:</u>

E). They monitor email traffic.

<u>Explanation:</u>


Track Your Device's IP Address with mail. If your laptop or smartphone was stolen, you can use a service like mail to find the IP address of your thief. When you log into those services from any computer, it logs the IP address used, and displays your last used IP in your account. So, these are source for finding the stolen laptop and smartphones.

I hope you got the idea. Thanks

You might be interested in
Tabs are usually set ________ to the right of the left margin.
gayaneshka [121]
Ur answer is: a-half-inch
6 0
3 years ago
Read 2 more answers
When should you use the Reply All function when replying to an email
Dmitrij [34]
When the email was sent as a group email 

5 0
3 years ago
Read 2 more answers
A company that designs video games has decided to expand and needs to hire Software Developers, Web Administrators, and Computer
choli [55]
Collage graduates that are currently jobless or looking to apply for a jod
8 0
2 years ago
Read 2 more answers
A user is having trouble signing in to the domain from a computer that has been out of service for several months, and nobody el
Pepsi [2]

Answer:

To solve the problem, first,

a) The computer account should be reset.

b) Deactivate the computer from the domain.

c) Then, rejoin it to the domain.

Explanation:

A domain is a network that  allows different computers to function and operate from a common server. A domain may or may not be protected by a password. Setting up a domain provides additional security thereby blocking other computer networks from having access to it. When a person is experiencing difficulties in logging into a domain, there are certain things to be done to resolve the issue.

First, reset the computer account.

Secondly, deactivate the computer from the domain.

Third, Rejoin it back to the domain.

5 0
3 years ago
¿Qué diferencia existe entre un virus biológico y virus informático?
ddd [48]

Answer:

i dont know spanish but i am gussing that you want to find differnce in virus information?

Explanation:

6 0
2 years ago
Other questions:
  • In dt.py, you will implement a basic decision tree classifier for
    5·1 answer
  • ____ are systems in which queues of objects are waiting to be served by various servers
    5·1 answer
  • Write a method so that the main() code below can be replaced by the simpler code that calls method mphAndMinutesToMiles(). Origi
    6·2 answers
  • Why is Abraham called the Father of Believers?
    6·1 answer
  • To more easily incorporate methods into a program, it is common practice to store methods in their own classes and files. Then y
    6·1 answer
  • The part of the computer that contains the brain or the Central Park nursing unit is also known as
    10·1 answer
  • Which code will allow Joe to print Coding is fun. on the screen? print("Coding is fun.") print(Coding is fun.) print = (Coding i
    10·2 answers
  • A local variable that is declared as ____ causes the program to keep the variable and its latest value even when the function th
    10·1 answer
  • Whose job is it to ensure that a group stays focused and on schedule?
    8·1 answer
  • An alternative to configuring individual workstations is to establish configurations dynamically when the computers connect to t
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!