Microsoft Internet Explorer and Mozilla Firefox are examples of this type of TCP/IP application.

A. mail client
B. Web client
C. Web server
D. FTP client


Answer: B

Computer Science & Information Technology

You might also like to view...

____ is a technique used to gain unauthorized access to computers, wherein the attacker assumes or simulates an address that indicate to the victim that the messages are coming from the address of a trusted host.

A. Sniffing B. Spoofing C. Spamming D. DDoS

Computer Science & Information Technology

The while modifier evaluates a Boolean expression and then conditionally executes the statement to which is has been appended as long as that condition remains true.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Identify the letter of the choice that best matches the phrase or definition.

A. Type of cell reference that refers to the same cell or range of cells on multiple worksheets in the same workbook B. Usually represented by words with colored letters and underlines or images C. A collection of two or more selected worksheets D. ?Contains the information when two files are linked E. ?Receives the information when two files are linked F. ?A connection between two files allowing information to be transferred from one file to the other

Computer Science & Information Technology

Which of the following is NOT a suggestion for preventing virus attacks?

A) delete all email messages from strangers B) install an antivirus software on the computer C) open any mail attachments if the source is known D) scan the system regularly E) update the antivirus software regularly

Computer Science & Information Technology