A method of securing data transmitted over a public untrusted network.
What will be an ideal response?
virtual private network
You might also like to view...
Match the following commands to the corresponding descriptions
_____ 1. U _____ 2. Esc _____ 3. O _____ 4. q! _____ 5. x _____ 6. dd _____ 7. . (dot) _____ 8. R _____ 9. o _____ 10. ? _____ 11. $ _____ 12. 0 (zero) _____ 13. w _____ 14. u _____ 15. wq a: Searches backward through a file b: Deletes a line c: Opens a line above the current line d: Repeats the last text changes e: Opens a line below the current line f: Exits the vi editor and saves the file. g: Exits the vi editor without saving the file h: Deletes a character indicated by the cursor position i: Undoes the recent changes on the current line j: Replaces character(s) and places vi in the text input mode k Places the cursor at the end of the current line l Places the cursor at the beginning of the current line n Moves the cursor one word forward m Places the vi editor in the command mode o Undoes all changes on the current line.
To insert a picture into a Word document, you choose Picture found in the ________ group of the Insert tab
A) Pages B) Illustrations C) Tables D) Symbols
A collaborative Web page that is designed to be edited and republished by a variety of individuals is known as a(n) ____.
A. e-portfolio B. wiki C. e-blog D. e-diary
Describe the TCP/IP protocol designed by Microsoft that enabled it to keep using NetBIOS names but dump the NetBEUI protocol.
What will be an ideal response?