Credit sources referred to as ________ are placed at the bottom of the page.
a. citations
b. endnotes
c. pages
d. footnotes
Ans: d. footnotes
You might also like to view...
The ________ is an audit collection module operating as a background process on a monitored system whose purpose is to collect data on security related events on the host and transmit these to the central manager. ? ?
A. central manager module ? ? B. host agent module C. intruder alert module ? D. LAN monitor agent module
Fast connections that blaze away at speeds over 100 Mbps (100 million bits per second) are called ____ connections.
A. broadband B. DSL C. cable Internet D. dial-up
In query design, the ________ row allows you to set limits on what records are displayed
Fill in the blank(s) with correct word
When a firewall receives a packet that is a provable attack, the firewall will ________.
A. log the packet B. drop the packet C. allow the packet D. drop and log the packet