Network components will fail, and you can sum up the best protection against such failure in one word. Select that word from the following:
A. firewalls
B. redundancy
C. DMZ
D. rootkit
Answer: B
Computer Science & Information Technology
You might also like to view...
A characteristic of __________ is that only an object's methods are able to directly access and make changes to an object's data.
a. classes b. procedures c. data hiding d. component reusability
Computer Science & Information Technology
The fetch-and-execute cycle is also called the ________ cycle
A) processing B) control C) instruction D) management
Computer Science & Information Technology
________ are used to navigate among multiple worksheets in an Excel workbook
A) Navigation tabs B) Name tabs C) Sheet tabs D) Selection tab
Computer Science & Information Technology
What is the default reference type when recording a macro?
A) Absolute B) Mixed C) Normalitive D) Relative
Computer Science & Information Technology