Enforcing a virtual security perimeter using a client's geographic location is known by what term?

a. geohashing
b. geofencing
c. geolocating
d. geolocking


ANSWER: b

Computer Science & Information Technology

You might also like to view...

________ shows the report design but not the data

A) Report view B) Print Preview C) Layout view D) Design view

Computer Science & Information Technology

An advantage of the ____ object approach is that it encourages extending existing code without needing to completely rewrite it.

A. past-present B. inside-outside C. dynamic D. open

Computer Science & Information Technology

In the early days when the Internet was very small, a special text file called _____________ contained a list of IP addresses for every computer on the Internet, matched to the corresponding system name.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

What type of brush creates a natural brush stroke with the streaks and varying opacities you would find with an actual paint brush?

A. Art B. Scatter C. Bristle D. Calligraphic

Computer Science & Information Technology