COGNITIVE ASSESSMENT
What is the approximate distance most Bluetooth devices can be from each other to communicate, without using additional equipment?
A. 8 feet
B. 33 feet
C. 80 feet
D. 100 feet
Answer: B
You might also like to view...
A low memory _____________ setting will keep applications that try to utilize too much memory under control.
Fill in the blank(s) with the appropriate word(s).
After installation, how many days do you have to activate Windows 7?
A. 7 B. 30 C. 45 D. 60
Access will place ________ around a text string within a query criteria that will limit the results to their exact specifications
A) quotation marks (") B) dollar signs ($) C) ampersands (&) D) asterisks (*)
Answer the following statements true (T) or false (F)
1. Hardware is the most vulnerable to attack and the least susceptible to automated controls. 2. Contingency planning is a functional area that primarily requires computer security technical measures. 3. X.800 architecture was developed as an international standard and focuses on security in the context of networks and communications. 4. The first step in devising security services and mechanisms is to develop a security policy. 5. Assurance is the process of examining a computer product or system with respect to certain criteria.