1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lawyer [7]
2 years ago
14

You have 5 salespersons who work out of your office and who frequently leave their laptops laying on their desk in their cubicle

s. You are concerned that someone might walk by and take one of these laptops. Which of the following is the BEST protection to implement to address your concerns?
a. Require strong passwords in teh local security policy.b. Use cable locks to chan the laptops to the desks.c. Implement screen saver passwords.d. Encrypt all company data on the hard drives.
Computers and Technology
1 answer:
kati45 [8]2 years ago
3 0

There are different ways to ensure safety of devices. The best protection to implement to address your concerns is to use cable locks to chain the laptops to the desks.

  • The use of laptop locks is as good as when compared to bicycle chain locks. One can do this by looking for a big, immovable object, such as one's desk, and thereafter you wrap the metal cable around it and then insert the lock into your laptop's lock slot.

With this, your computer becomes theft-proof.

Thia will give you piece of mind as you will not be restless anymore.

Learn more about Laptop security from

brainly.com/question/24956493

You might be interested in
Task 2
yanalaym [24]

Answer:

If the following answer is helpful please mark as brainliest. This is the answer:

Explanation:

print("What is your name?")

name=input()

print("And where do you live", name)

location=input()

print("I've never been to", location)

5 0
1 year ago
The most effective technique of malware propagation among the following list
iVinArrow [24]

Question Completion with Options:

A. Embedding & packing malcode in application programs

B. Replacing the Import-Address-Table (IAT)

C. Appending & prepending malcode into application programs

D. Embedding malcode in documents, such as MS O Office & PDF

Ε. Replicating malcode's source code

Answer:

The most effective technique of malware propagation among the following list is:

A. Embedding & packing malcode in application program

Explanation:

Malware propagation becomes effective and replicates effortlessly when malicious codes (otherwise called malcodes, which are self-replicating malicious programs) are embedded and packed in application programs.  These usually take many years before they start to manifest, making them very difficult to detect.  They are often triggered by some set events.  Given the nature of malcodes and the culprits behind them, they are very dangerous to applications and pose substantial business risks.

6 0
2 years ago
Which spreadsheet feature could the scholarship committee use to locate applicants who meet the criteria?
Radda [10]

Answer:

H8

Explanation:

4 0
2 years ago
To delete a database object, right-click the object in the Navigation Pane and then click ____ on the shortcut menu.
Reil [10]
Click DELETE on the Shortcut Menu. Be sure that the object you are deleting is closed before because it will not let you delete.
3 0
3 years ago
Is a book considered technology?
kumpel [21]
Yes, "technology" doesn't have to be all about computers or cell phones.. Technology is anything that is a new advance in knowledge and books were once a great advance in that field.
7 0
3 years ago
Read 2 more answers
Other questions:
  • An app builder has created a report for sales people to view records from the custom object, some users have complained that the
    8·1 answer
  • Describe the major research, discoveries, or impact Timothy Berners-Lee has made on the scientific community. 100 points for ans
    6·1 answer
  • To create a new query in Design view, click CREATE on the ribbon to display the CREATE tab and then click the ____ button to cre
    9·1 answer
  • Give one example of a civil engineering structure.
    5·1 answer
  • Circular error are caused by adding the cell name of a/an cell to aformula
    7·1 answer
  • Circular errors are caused by adding the cell name of a/an _______ cell to a formula.
    11·2 answers
  • Does anyone know the answer for this? I’m extremely confused.
    8·2 answers
  • Write a function process_spec that takes a dictionary (cmap), a list (spec) and a Boolean variable (Button A) as arguments and r
    10·1 answer
  • In java please
    13·1 answer
  • If you would like to give another user permissions on your mailbox or to particular folders within your mailbox, which role shou
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!