The data type of each ____ depends on the specific application.

A. pointer
B. node
C. address
D. link


Answer: B

Computer Science & Information Technology

You might also like to view...

New tags and attributes that Web browser manufacturers add to provide new functionality are commonly referred to as ____.

A. complements B. extensions C. browser boosters D. resolutions

Computer Science & Information Technology

The ability to ____ text and treat it as a digital image opens up countless possibilities as you use Photoshop’s digital image-editing tools.

a. rasterize b. warp c. liquify d. distort

Computer Science & Information Technology

When working with Sendmail, what command can be used to test SMTP support?

A. EHLO B. telnet C. HELO D. smtp

Computer Science & Information Technology

A network technician needs to protect IP based servers in the network DMZ from being discovered by an intruder utilizing a ping sweep. Which of the following should the technician do to protect the network from ping sweeps?

A. Block echo replies inbound to the DMZ B. Disable UDP on the servers C. Block ICMP at the firewall D. Disable TCP/IP on the server

Computer Science & Information Technology