How can security professionals use software to recover stolen laptops ?
A. They use a database to list laptop license information.
B. They communicate secretly with the laptops using an internet connection.
C. They use mapping software to visit the last location of the laptops.
D. They search for the laptops on the web.
E. They monitor email traffic.