Enforcing a virtual security perimeter using a client's geographic location is known by what term?
a. geohashing
b. geofencing
c. geolocating
d. geolocking
ANSWER: b
You might also like to view...
________ shows the report design but not the data
A) Report view B) Print Preview C) Layout view D) Design view
An advantage of the ____ object approach is that it encourages extending existing code without needing to completely rewrite it.
A. past-present B. inside-outside C. dynamic D. open
In the early days when the Internet was very small, a special text file called _____________ contained a list of IP addresses for every computer on the Internet, matched to the corresponding system name.
Fill in the blank(s) with the appropriate word(s).
What type of brush creates a natural brush stroke with the streaks and varying opacities you would find with an actual paint brush?
A. Art B. Scatter C. Bristle D. Calligraphic