Once you've added a number of professional contacts to your overall Facebook friends list, it's good practice to create a specific ________ of just these professional friends

A) page B) list C) network D) group


B

Computer Science & Information Technology

You might also like to view...

Draw a use case diagram for an ATM (cash terminal). The system includes two actors: a customer, who draws money from his account either on the money chip on his bank card or in cash, and a security man, who fills money into the ATM.

Use cases should include: DrawCash, LoadMoneyChip, CheckAccountBallance, FillATM. Also include the following exceptional cases: OutOfMoney, TransactionAborted (i.e., customer selected the cancel button without completing the transaction) and MoneyChipOutOfOrder. Remark: It is possible to use inheritance between use cases! Write the flow of events and specify all fields for the use case CheckAccountBalance that you drew before. Specify relationships.

Computer Science & Information Technology

Configuring a firewall to ignore all incoming packets that request access to a specific port is known as ________

A) packet switching B) static addressing C) packet filtering D) logical port blocking

Computer Science & Information Technology

What must occur for a system to perform a context switch?

a) The kernel must save the current running process’s execution context to the process’s PCB. b) The kernel must load the previous execution context of a ready process. c) both a) and b) d) none of the above

Computer Science & Information Technology

Misappropriation of assets can involve various schemes: expense reimbursement fraud, lapping, and payroll fraud. Explain each and give an example.

What will be an ideal response?

Computer Science & Information Technology