COGNITIVE ASSESSMENT
You are using a technology to enable two devices to share contacts when they touch. What is the name for this technology?
A. NLC
B. NFC
C. AFD
D. DDF
Answer: B
You might also like to view...
Design a remote object table that can support distributed garbage collection as well as translating between local and remote object references. Give an example involving several remote objects and proxies at various sites to illustrate the use of the table. Show what happens when an invocation causes a new proxy to be created. Then show what happens when one of the proxies becomes unreachable
What will be an ideal response?
A(n) ____________________ is a collection of information stored on one or more computers organized in a uniform format of records and fields.
Fill in the blank(s) with the appropriate word(s).
The New Connection Security Rule Wizard enables you to create connection security rules. Which type of rule enables you to limit connections according to authentication criteria you define?
a. Isolation b. Authentication Exemption c. Server-to-server d. Tunnel
Saving the closing lines of a letter is a poor application of creating a Quick Part for later use.
Answer the following statement true (T) or false (F)