From the user’s point of view, plug-and-play devices that are added to the system typically are ready to use ________.

a) after restarting the computer
b) after manually configuring the operating system to identify the device
c) immediately, with little or no user interaction
d) after logging off and logging back onto the system


c) immediately, with little or no user interaction

Computer Science & Information Technology

You might also like to view...

Values of type ____ are represented using 16-bit integer numbers.

A. int B. boolean C. char D. long

Computer Science & Information Technology

Which of the following can be described as an isolated guest operating system installed on top of a normal operating system?

A. virtual machine B. physical server C. host computer D. emulated PC

Computer Science & Information Technology

The ____, which is also known as the Security Incident Response Team (SIRT), is the group of individuals who would be expected to respond to a detected incident.

A. CP Management Team (CPMT) B. disaster recovery (DR) team C. Computer Security Incident Response Team (CSIRT) D. business continuity (BC) team

Computer Science & Information Technology

After choosing the storage layout for a new virtual disk, you will be presented with two options for the provisioning type. You can choose from thin or ________

Fill in the blank(s) with correct word

Computer Science & Information Technology