When an Internet user connects to the Internet to access information and services, the user is considered to be ____.
A. connected
B. online
C. busy
D. offline
Answer: B
Computer Science & Information Technology
You might also like to view...
The range of valid index values for an array name runs from 0...name.length.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
What is an expected utilization percentage for a network?
What will be an ideal response?
Computer Science & Information Technology
________, ________ and ________ are application-layer protocols supported by Windows XP.
a) WinINET; WinHTTP; CIFS b) WinINET; NBT; NetBIOS c) WinHTTP; NetBIOS; CIFS d) NBT; NetBIOS; CIFS
Computer Science & Information Technology
The ____ attribute protects folders and files so that only the user who encrypts the folder or file is able to read it.
A. NTFS compress B. hidden C. NTFS encrypt D. privacy
Computer Science & Information Technology