Which of the following is the unique address of the network interface card (NIC)?
A) IP address
B) NIC address
C) MAC address
D) URL address
C) MAC address
You might also like to view...
Answer the following statements true (T) or false (F)
1. An XML DTD is much more powerful than a schema. 2. Bar codes appear on any person or object that needs to be checked into and out of any kind of inventory system. 3. Radio frequency identification allows the automatic collection of data using tags or transponders that contain a chip and an antenna. 4. There are three main problems that can occur with input transactions: submitting the wrong data to the system, submission of data by an unauthorized person, or asking the system to perform an unacceptable function.
Investigations into hackers can be difficult because even with a full audit trail showing that a user came from a particular account on a particular ISP,
A) Often only billing information is available, which does not prove identity B) The hacker may use more than one ISP C) ISPs almost never release the necessary information D) All of the above
The Data Source Configuration Wizard uses the ____ method to populate a DataSet object with table rows and columns from a selected table within a database.
A. Populate B. Fill C. Arrange D. Cache
_____ allows you to see through a slide background or a color.
A. Opaqueness B. Ambiguity C. Transparency D. Transversely