The first step in the information processing cycle ____.
A. outputs information
B. stores data and information
C. inputs data
D. processes data
Answer: C
You might also like to view...
Describe the methods used in each of the following protocols to prevent a replay attack:
a. Kerberos authentication b. SET c. Electronic cash
In a form, you can move to the next field by pressing the Enter or ________ keys
A) Ctrl + Tab B) Ctrl + Enter C) Tab D) PgDn
How can redundancy be provided in a switched network?
a. By deploying one central switch with a high port density b. By using high-speed fiber-optic media c. By providing multiple interconnections between a number of switches d. By delpoying gigabit switches only
Internet addresses are controlled by which one of the following protocols?
A. TCP B. IP C. UDP D. HTTP (Hypertext Transfer Protocol)