When an Internet user connects to the Internet to access information and services, the user is considered to be ____.

A. connected
B. online
C. busy
D. offline


Answer: B

Computer Science & Information Technology

You might also like to view...

The range of valid index values for an array name runs from 0...name.length.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

What is an expected utilization percentage for a network?

What will be an ideal response?

Computer Science & Information Technology

________, ________ and ________ are application-layer protocols supported by Windows XP.

a) WinINET; WinHTTP; CIFS b) WinINET; NBT; NetBIOS c) WinHTTP; NetBIOS; CIFS d) NBT; NetBIOS; CIFS

Computer Science & Information Technology

The ____ attribute protects folders and files so that only the user who encrypts the folder or file is able to read it.

A. NTFS compress B. hidden C. NTFS encrypt D. privacy

Computer Science & Information Technology