To access the Macintosh file system over the network, ____________________ must be enabled.
Fill in the blank(s) with the appropriate word(s).
file sharing
You might also like to view...
A __________ is when a user views a Web page controlled by the attacker that contains a code that exploits the browser bug and downloads and installs malware on the system without the user’s knowledge or consent.
Fill in the blank(s) with the appropriate word(s).
________ is a computer's short-term memory that stores data and program instructions waiting to be processed
A) RAM B) CPU C) ROM D) ALU
A(n) ____________________ is a collection of documents, images, or projects, compiled to show a variety of examples of someone's work.
Fill in the blank(s) with the appropriate word(s).
A(n) ______ is a user who posts negative, inflammatory comments on a blog post or article with the intent of inciting other users.
Fill in the blank(s) with the appropriate word(s).