Which of the following protocols describes a connectionless state and does not use acknowledgements?
A. POP3
B. UDP
C. NTP
D. TCP
Answer: B. UDP
Computer Science & Information Technology
You might also like to view...
__________ is where the attacker forges a signature for a particular message chosen by the attacker.
A. Total break B. Universal forgery C. Existential forgery D. Selective forgery
Computer Science & Information Technology
In an analog representation, objects can take on only specific values. _________________________
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
In object-oriented programming, ________ allows a new class to automatically use all the data and methods of an existing class.
A. reusability B. regression C. scalability D. inheritance
Computer Science & Information Technology
When you include table names in a structure reference it is called a(n) ________ structured reference.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology