Network components will fail, and you can sum up the best protection against such failure in one word. Select that word from the following:

A. firewalls
B. redundancy
C. DMZ
D. rootkit


Answer: B

Computer Science & Information Technology

You might also like to view...

A characteristic of __________ is that only an object's methods are able to directly access and make changes to an object's data.

a. classes b. procedures c. data hiding d. component reusability

Computer Science & Information Technology

The fetch-and-execute cycle is also called the ________ cycle

A) processing B) control C) instruction D) management

Computer Science & Information Technology

________ are used to navigate among multiple worksheets in an Excel workbook

A) Navigation tabs B) Name tabs C) Sheet tabs D) Selection tab

Computer Science & Information Technology

What is the default reference type when recording a macro?

A) Absolute B) Mixed C) Normalitive D) Relative

Computer Science & Information Technology