____ is a method of using multiple systems to take turns handling requests, to prevent any one system from getting overloaded.

A. Network load balancing (NLB)
B. Network proxying (NP)
C. Buffer overflow
D. Screen subnets


Answer: A

Computer Science & Information Technology

You might also like to view...

A __________ is a column (or columns) that uniquely identifies each row of data in a database.

a. selector b. main key c. identifier d. primary key

Computer Science & Information Technology

What is NOT an important factor regarding online support when deciding between a brand name and no name computer?

A) Is the support user-friendly? B) Is it available in your area? C) Can you use e-mail? D) Is the support comprehensive?

Computer Science & Information Technology

You add the ____ server behavior to the pages that you want to protect.

A. Restrict Access To Page B. Protect Data C. No Log In D. No Access

Computer Science & Information Technology

Develop a testing plan for the new system that addresses unit, integration, and system testing. Design the test data, and explain the design.

What will be an ideal response?

Computer Science & Information Technology