Businesses and organizations first began to use data communications and network technology to connect computer systems in the ____.

A. 1960s
B. 1970s
C. 1980s
D. 1990s


Answer: C

Computer Science & Information Technology

You might also like to view...

Method reduce’s first argument is formally called a(n) ________ value—a value that, when combined with any stream element using the IntBinaryOperator produces that element’s original value.

a. original b. identity c. preserve d. self

Computer Science & Information Technology

____ is a filter that is very effective at finding and isolating edges.

A. Low Pass B. Edge Pass C. Isolate Edge D. High Pass

Computer Science & Information Technology

In the Document Settings dialog box, the ____ option matches the size of the Stage to be the same as the printer page size.

A. Match: Print Area B. Match: Default C. Match: Contents D. Match: Printer

Computer Science & Information Technology

John has subscribed to a cloud-based service to synchronize data between his smartphone, tablet, and PC. Before allowing the data to be synchronized, this service uses a process in which the cloud service and the client on the smartphone will verify the security of all devices’ security certificates.   What type of security does the cloud-base service employ?

A. Mutual authentication B. VPN C. IMAP D. Tethering

Computer Science & Information Technology