Managed devices run specialized __________ called agents.
A. robots
B. switches
C. drones
D. software
Answer: D
Computer Science & Information Technology
You might also like to view...
When you use ________ you can only select one permission level
Fill in the blank(s) with correct word
Computer Science & Information Technology
Sparkline charts extend over multiple cells and illustrate trends in selected cells.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
The ________ event occurs when a report is open and its record(s) is/are displayed
A) On Dirty B) On Load C) On Open D) On Activate
Computer Science & Information Technology
In ________, the perpetrator tries to obtain money or other goods by threatening to take actions that would be against the victim's interest.
A. extortion B. fraud C. hacking D. abuse
Computer Science & Information Technology