Ad hoc mode is sometimes called ____________________ mode.

Fill in the blank(s) with the appropriate word(s).


peer to peer

Computer Science & Information Technology

You might also like to view...

Select the components of a search engine.

a. robot b. database c. search form d. all of the above

Computer Science & Information Technology

Click the Format icon in the Design tab of the Ribbon to add a calculated field to a PivotTable

Indicate whether the statement is true or false

Computer Science & Information Technology

If the primary goal of a firewall is to block unauthorized access, the emphasis needs to be on restricting rather than enabling connectivity

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

If you make a mistake, you can go back and undo the error. What is the keyboard shortcut for undo?

What will be an ideal response?

Computer Science & Information Technology