Which of the following applications is included with Microsoft Office Standard 2010?
A. SharePoint Workspace
B. InfoPath
C. Communicator
D. OneNote
Answer: D
You might also like to view...
Answer the following statements true (T) or false (F)
1. A widely used technique for pseudorandom number generation is an algorithm known as the linear congruential method. 2. A cryptographically secure pseudorandom bit generator is defined as one that passes the least significant bit test. 3. The security of Blum, Blum, Shub is based on the difficulty of factoring n. 4. The stream cipher is similar to the one-time pad with a difference being that a one-time pad uses a pseudorandom number stream and a stream cipher uses a genuine random number stream. 5. The longer the keyword the more difficult the cryptanalysis.
Which of the following is the command used to display currently open ports on a Windows operating system?
a. netstat -a b. netstat -r c. netstat -o d. netstat - a
The advantage of using a list of pointers is that logical groups of data headings can be collected and accessed with one array name.
Answer the following statement true (T) or false (F)
What command would a technician use to see all the connections including port numbers being used by a computer?
A) ping B) ipconfig C) net share D) netstat E) nslookup