COGNITIVE ASSESSMENT
You are using a technology to enable two devices to share contacts when they touch. What is the name for this technology?

A. NLC
B. NFC
C. AFD
D. DDF


Answer: B

Computer Science & Information Technology

You might also like to view...

Design a remote object table that can support distributed garbage collection as well as translating between local and remote object references. Give an example involving several remote objects and proxies at various sites to illustrate the use of the table. Show what happens when an invocation causes a new proxy to be created. Then show what happens when one of the proxies becomes unreachable

What will be an ideal response?

Computer Science & Information Technology

A(n) ____________________ is a collection of information stored on one or more computers organized in a uniform format of records and fields.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The New Connection Security Rule Wizard enables you to create connection security rules. Which type of rule enables you to limit connections according to authentication criteria you define?

a. Isolation b. Authentication Exemption c. Server-to-server d. Tunnel

Computer Science & Information Technology

Saving the closing lines of a letter is a poor application of creating a Quick Part for later use.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology