The communications methodology that computers use to transfer data is called ________
A) static addressing
B) packet transfer protocol
C) packet switching
D) circuit switching
C
You might also like to view...
When components are added to a container with a GridLayout, the component ________.
a. fills the next spot in the row, continuing in the first position of the next row if the current row is full b. fills the next spot in the column, continuing in the first position of the next column if the column is full c. fills in row x, column y if x and y are two integers passed to the Container method add d. fills in a random empty position in the grid
The logical network perimeter mechanism can be used to control the bandwidth made available to isolated IT resources.
a. True b. False
Surge protectors are effective for preventing damage to the computer from fluctuations in ________
Fill in the blank(s) with correct word
Match the following terms to their meanings:
I. Encrypt II. Decrypt III. Open Read-Only IV. Open Exclusive V. Open Exclusive Read-Only A. Opens the database so that all objects can be opened and viewed, but data and design changes cannot be made B. Opens the database in both Exclusive and Read-Only modes C. Hides data by making the file unreadable until the correct password is entered D. When you no longer want a password to be required to open a database, you can do this or unset the password E. Opens the database so that changes can be made, but no one else may open the database at the same time