What protocol is the most widely used and allows all computers on a network to communicate and functioncorrectly?
A. IPX/SPX
B. ATM
C. TCP/IP
D. NetBIOS
Answer: C
You might also like to view...
To discover the size of the graphics file, you should select the _____ option from the drop-down menu.
A. Properties B. Image size C. Image properties D. Show picture
In Alice, the ____ button can be used if you are unhappy with one of your moves.
A. Add instance to world B. Undo C. create new method D. ADD OBJECTS
Which of the following layer of the OSI model is responsible for addressing of the packets?
A. Presentation B. Session C. Network D. Transport
Jacob has discovered what he believes is a crime on a computer that he is servicing. Jacob has identified and gone through the proper channels to report the incident. He has created a backup of the entire hard drive to preserve the evidence and has started to document the evidence. ? What must Jacob maintain so the evidence can be used to prosecute the crime?
A. Incident documentation B. Chain of custody C. A backup of the data D. Private property laws