Managed devices run specialized __________ called agents.

A. robots
B. switches
C. drones
D. software


Answer: D

Computer Science & Information Technology

You might also like to view...

When you use ________ you can only select one permission level

Fill in the blank(s) with correct word

Computer Science & Information Technology

Sparkline charts extend over multiple cells and illustrate trends in selected cells.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The ________ event occurs when a report is open and its record(s) is/are displayed

A) On Dirty B) On Load C) On Open D) On Activate

Computer Science & Information Technology

In ________, the perpetrator tries to obtain money or other goods by threatening to take actions that would be against the victim's interest.

A. extortion B. fraud C. hacking D. abuse

Computer Science & Information Technology