You have 5 salespersons who work out of your office and who frequently leave their laptops laying on their desk in their cubicles. You are concerned that someone might walk by and take one of these laptops. Which of the following is the BEST protection to implement to address your concerns?
a. Require strong passwords in teh local security policy.b. Use cable locks to chan the laptops to the desks.c. Implement screen saver passwords.d. Encrypt all company data on the hard drives.

Answers

Answer 1

There are different ways to ensure safety of devices. The best protection to implement to address your concerns is to use cable locks to chain the laptops to the desks.

The use of laptop locks is as good as when compared to bicycle chain locks. One can do this by looking for a big, immovable object, such as one's desk, and thereafter you wrap the metal cable around it and then insert the lock into your laptop's lock slot.

With this, your computer becomes theft-proof.

Thia will give you piece of mind as you will not be restless anymore.

Learn more about Laptop security from

https://brainly.com/question/24956493


Related Questions

When resizing images or objects in a presentation, why should a user not utilize the sizing handles in the middle of the sides or bottom of an image?

B will resize but not maint aspect ratio was correct

Answers

Answer:

b. It will resize the image but not maintain aspect ratio

Explanation: is correct. post protected

Answer:

b

Explanation:

we are unable to process your request at this time. if you continue to receive this error, please contact cardholder services by calling the number on the back of your card.

Answers

Answer:

is this a sim chip card replacement card for Electronics ?

Explanation:

Four types of firewalls are: Packet filtering, stateful inspection, circuit level proxy and _________ .

Answers

Answer:

oxigen

Explanation:

the pathway through which an electric signal moved between devices is known as what?

Answers

The answer would be electric Circuit or just circuit!

In older languages, you could leave a selection or loop before it was complete by using a ____ statement

Answers

Answer:

D) go to

Explanation:

A) next

B) go next

C) loop

D) go to

D) go to is correct answer

(Hope this helps can I pls have brainlist (crown)☺️)

text to appear
Name the highlighted part as a whole. What are the segments- bgcolor and “SKYBLUE” called?
What is the output going to be due to the highlighted part?

Answers

Answer:

bg color stands for background color while SKYBLUE is the color assigned to it.

Explanation:

It is setting the background color of the body tag to sky blue.

a steep reduction is memory available on the heap to the poiont where it is completly exhausted is known as a

Answers

Based on the information that is given, a steep reduction in the memory that's available is known as a memory leak.

A memory leak simply means a form of resource leak which occurs when a computer program manages memory allocations incorrectly in such a way that the memory that isn't needed anymore aren't released.

It should be noted that a memory leak is also a steady reduction in memory available on the heap to the point where it's exhausted. It can also be when an object that is stored in memory can't be accessed by the running code.

Read related link on:

https://brainly.com/question/25820385

PLEASE HELP ME FASTTTTTT Input statements allow the user to enter data that a program uses to perform necessary computations. Users enter the data when they the program.

Answers

Answer:

The scanf() is the function that is used to take inputs from the user with the help of the standard input device,i.e, the keyboard.

scanf() function is capable of taking any data type as an input, though it has to be specified first like %d for integers, %s for strings and %f for floating-point type. The gets() function can only take a string as an input.

Explanation:

Answer:

ur

Explanation:

ur mom

In Java, a reference variable is ________ because it can reference objects of types different from its own, as long as those types are related to its type through inheritance.

Answers

Answer:

polymorphic

Explanation:

An example of polymorphic reference, suppose you have 3 classes: Main, Product and SpecificProduct. If SpecificProduct extends Product this means it is a product class but with something else to complement.

Say you want to reference an object of product in the main class, you can do it the classic way:

Product pd = new Product();

Or you can do it polymorphic, like this:

Product pd = new SpecificProduct();

The program will accept just fine because SpecificProduct is extending Product. When you do it like this, we say the reference you made was a polymorphic reference

Need help with 3.2 lesson practice questions (edhesive)​

Answers

Answer:

Doesn't have a question

Explanation:

THANK YOUU

Tamara is writing a program to organize students in a class and needs to use operators to organize student grades, then compare the results of that to each other. What kinds of operators does Tamara need to use for each step?
Tamara needs to use
operators to organize the students' grades, then
operators to compare the results.

Answers

Answer:   you said "Tamara needs to use

operators to organize the students' grades, then

operators to compare the results."

i think your right

Explanation:

sounds right.

it is possible to be logged into a wi-fi network that does not have internet access.

Answers

Answer:

yes it is possible. it'll take some work tho

Explanation:

you would have to bypass the security and disable the proxy and go through the firewall and do some other things to access it

The CNSS model of information security evolved from a concept developed by the computer security industry known as the ____________________ triad.

Answers

The CNSS model of information security evolved from a concept developed by the computer security industry known as the CIA triad .

When a mobile user connects to a main office using a standard Internet connection, a ____ provides the mobile user with a secure connection to the company network server.

Answers

A virtual private network (VPN) is an encrypted connection using a standard Internet connection to connect a device to a network.

A virtual private network (VPN) is used to connect a private network to a public network. It enables users have access to the private network thereby enabling them to send and receive data across public networks.

A virtual private network (VPN) is an encrypted connection using a standard Internet connection to connect a device to a network.

Find out more at: https://brainly.com/question/25234505

Which is a function of an operating system?.

Answers

Answer:

An operating system is known as the interface between the computer hardware and the user itself. It is one of the most essential parts of a computer, and is the most integral software. It's responsible for executing programs, handling other inputs i.e an additional mouse, keyboard, etc. as well as handling storage for data and other files. In addition to this, it manages the computer's resources as well as executes and enables services.

________________ is access to the internet through your tv connection.

Answers

Answer:

Cable Modem

Explanation:

Until 2016, the popular song _____ was covered by copyright law, unusually long after it was written in 1893.

A.
Happy Birthday

B.
Merry Christmas, Everyone

C.
Hava Nagila

D.
Auld Lang Syne

Answers

Answer: Happy Birthday

Explanation:

Answer is A. Happy Birthday

What is the quickest option for adding internet images to a PowerPoint presentation?

*it's b. use the online pictures option....

Answers

Answer:

b. Use the Online Pictures option to perform a search of web-based images to insert.

Explanation:is correct. post protected

i will give brainliest to the best answer. what is a good screen recorder

Answers

Answer:

If your on windows there is an x-box screen recorder installed on it. thats a new windows 11 update. If not, i used to use x-split broadcaster

Explanation:

If your on windows there is an x-box screen recorder installed on it. thats a new windows 11 update. If not, i used to use x-split broadcaster

mark me Brainliest

What is the largest integer that can be represented with 4 bits?.

Answers

Answer:

15

Explanation:

You can calculate the maximum number using a simple formula:

2^N (Where N is the number of bits) - 1

So 2^4 - 1 = 16 - 1 = 15

Which tools exist on the 3-D Map Layer pane? Check all that apply. filter options layer options time visualization category visualization Udata layer visualization data value visualization​

Answers

Answer:

filter options

layer options

category visualization

data value visualization

Explanation:

What access-point feature allows a network administrator to define what type of data can enter the wireless network?

Answers

Traffic filtering. It’s name is self-explanatory!

A user is troubleshooting a mobile device app that is displaying errors and has contacted the app manufacturer’s technical support team for assistance. The support technician needs specific information from the device about how the app is responding and what is happening to cause the errors.

Answers

Answer:

D. The method for retrieval is dependent on the specific app or device’s operating system.

1.Write a C++ program that allows the user to enter the phrase "I am smart". Output the first letter and last letter of the phrase using string properties.

2.Write a C++ program to output the following values after they are loaded into an array: 67, 45, 12, 89, 46, 88 and 43.
PLS Help they are different questions

Answers

Answer:

1)

string value;

cout << "type I am smart";

cin >> value; // get user input from the keyboard

2)

int num1 = 67;

int num2 = 45;

int num3 = 12;

int num4 = 89;

int num5 = 46;

int num6 = 89;

int num7 = 46;

int num8 = 88;

int num9 = 43;

int numbers [ ] = {num1,num2,num3,num4,num5,num7,num8,num9} ;

//to load it as a function

int main ()

{

for ( n=0 ; n<5 ; n++ )

{

result += numbers[n];

}

cout << result;

return 0;

}

The C++ programs are illustrations of arrays and strings

The program 1

The program written in C++ is as follows:

#include<iostream>

using namespace std;

int main(){

   //This declares the string

   string myStr;

   //This gets the input

   cin>>myStr;

   //This prints the first and the last index elements

   cout<<myStr[0]<<" "<<myStr[myStr.length()-1];

   return 0;

}

The program 2

The program written in C++ is as follows:

#include<iostream>

using namespace std;

int main(){

   //This initializes the array

   int myArr [] = {67, 45, 12, 89, 46, 88, 43};

   //This prints the array elements

   for(int i = 0; i<7;i++){

       cout<<myArr[i]<<" ";

   }

   return 0;

}

Read more about arrays and strings at:

https://brainly.com/question/15683939

#SPJ2

a ________ uses electronic memory and has no motors or moving parts.

Answers

Answer:

a to uses electronic memory and has no motors or moving parts.

Explanation:

brainliest me and follow ty

ok so I have two accounts and like, the other account has -20 points??? what happened​

Answers

You need to do the questions to get more points

1. Which software is used mostly for typing text? a) Word b) Excel O c) PowerPoint o d) Paint​

Answers

Answer:

a. Word

Explanation:

Microsoft Word is the most widely used word processing software according to a user tracking system built into the software.

Answer: a) Word

Explanation: Microsoft Word is the most widely used word processing software.

write an expression taht evaluated to true if and only if the variable s does not contain the string 'end'

Answers

Answer:

//check which string is greater

if(strcmp(name1,name2)>0)

//assign name1 to first, if the

    //name1 is greater than name2

    first=name1;

else

    //assign name2 to first, if the

    //name2 is greater than name1

    first=name2;

5)

//compare name1 and name2

    if(strcmp(name1,name2)>0)

   

         //compare name1 and name3

         if(strcmp(name1,name3)>0)

       

             //assign name1 to max, becuase

             //name1 is greater than name2 and name3

             max=name1;

       

Explanation:

How to turn robot voice like real human voice.

Answers

Go in front of the mirror and act like robot and talk ,there you have a robot voice like real human voice

from which Menu option you can change page setup in MS Word​

Answers

page layout tab or the page setup dialog box

Other Questions
Choose the correct definition of shaman.A a spirit being who represents forces of nature, such as mountains, rivers, trees, and rocksB a priest-like elder in an indigenous religion who is thought to have special powers to communicate with the spirit worldC an ancestor who is traced through the father's side of the familyD a storyteller or poet who recalls historical events and transmits history and culture from one generation to the next Which of the following is true about industry in Europe?Group of answer choicesEurope mostly produces heavy industrial products like machinery.Europe engages in very little industrial activity, instead focusing on agriculture.Very few electronics are produced in Europe, so they have to be imported from Asia or the United States.Banking and software production has become the foundation of Europe's economy.10 ptsWhen it was under the control of the Soviet Union, Eastern Europe was forced to have a _________ economy, which couldn't keep up with the economies of Western Europe.Group of answer choicescapitalisticmarketcommandmixedPLEASE ANSWER TWO QUESTIONS yOU CAN SAY part one: a,b,c,or dpart two: a,b,c,or d What is a parallel conflict? Draw a graph in the coordinate plane of the relationshp between the number of pounds of coffee (x) and total cost (y). no links Woh Che Co. has four departments: Materials, Personnel, Manufacturing, and Packaging. In a recent month, the four departments incurred three shared indirect expenses. The amounts of these indirect expenses and the bases used to allocate them follow.Indirect Expense CostAllocation BaseSupervision$82,500Number of employeesUtilities 50,000Square feet occupiedInsurance 22,500Value of assets in useTotal$155,000 Departmental data for the companys recent reporting period follow.DepartmentEmployees Square Feet Asset ValuesMaterials 27 25,000 $6,000 Personnel 9 5,000 1,200 Manufacturing 63 55,000 37,800 Packaging 51 15,000 15,000 Total 150 100,000 $60,000 1. Use this information to allocate each of the three indirect expenses across the four departments.2. Prepare a summary table that reports the indirect expenses assigned to each of the four departments. Please answer pronto!Which expression has a value of 48?A) (4+5) 3-93 B) 4+5 (3-9) 3 C) 4+5 3 (-93)D) 4+5 3 -93(This question was already asked and answered but they said the answer was wrong on didnt give the right answer) Find the pressure if a force of 750 N acts on an area of 12 cm3 When you are saving money you are: A:gathering B:cutting back C:discounting D:accumulating why are water-soluble vitamins less likely to be toxic compared to fat-soluble vitamins? Last year, 46% of business owners gave a holiday gift to their employees. A survey of business owners conducted this year indicated that 35% plan to provide a holiday gift to their employees. Suppose the survey results are based on a sample of 60 business owners. a. How many business owners in the survey plan to provide a holiday gift to their employees this year What is 3 4/5(1 1/10)?Write the answer as a mixed number in simplest form. What is 300,000,000x 4,000,000,000x6,000,000,000x 7,000,000,000x5000,000,000,000 I need help pls will give 25 points if right For any right triangle, the sum of the sqaures of the legs is equal to the square of the hypotenuse Why were Ruby Bridges and her classmates tested in kindergarten If you can complete this sentence you're smart enough to not try to cook medium rare chicken"Don't eat raw meat because it may contain harmful bacteria including __________"(Hint): Starts with an S Ms. McCullough bought a bunch of bananas. If she ate 2/8the bananas and Mrs. Byrd ate 1/4, what fraction of bananasremains? The nth term of a sequence is 3n2 - n + 10 where n is a positive integer. Which term in the sequence is equal to 54? 7. What are the slope and y-intercept of y=3x-5? what is 400x800 do any one knows