________ is a short-range wireless technology used to connect peripheral devices
Fill in the blank(s) with correct word
Bluetooth
Computer Science & Information Technology
You might also like to view...
The first expression appearing in the header of a for loop is the ____________, which usually assigns a starting value to a counter variable.
a. update expression b. test expression c. Boolean expression d. initialization expression
Computer Science & Information Technology
Twitter boasts of ________ million users, whereas Tumblr has 150 million users
Fill in the blank(s) with correct word
Computer Science & Information Technology
Symmetric encryption is also called public key cryptography.
a. true b. false
Computer Science & Information Technology
Access control is intended to guard the ____ of information by making it accessible only to authorized users.
A. confidentiality B. availability C. integrity D. non-repudiation
Computer Science & Information Technology