Match each of the following terms to its meaning:I.packet filteringII.IP addressIII.firewallIV.CAPTCHAV.biometric authentication deviceA.program that generates distorted text and requires that it be typed into a boxB.reads a unique personal characteristic and converts its pattern to a digital codeC.hardware or software for protecting computers from hackersD.a computer's numeric ID on the InternetE.method for selectively allowing certain requests to access ports

Fill in the blank(s) with the appropriate word(s).


E, D, C, A, B

Computer Science & Information Technology

You might also like to view...

_________ identifies the type of data contained in the payload data field by identifying the first header in that payload.

A) Security Parameters Index B) Next Header C) Sequence Header D) Payload Data

Computer Science & Information Technology

Francis has been charged with adding a table to the company newsletter showing the number of sick days that have been taken company-wide for each of the past five years, month by month. Unfortunately, Francis has never created and placed a table in an InDesign document. Francis knows that the first step in creating a table in InDesign is ____.

A. laying out the table in a database program. B. opening the Insert menu and clicking Table. C. creating a text box to put the table into. D. deciding on the number of rows and columns to create.

Computer Science & Information Technology

Identify the letter of the choice that best matches the phrase or definition.

A. A narrow recording band that forms a full circle on the surface of the disk B. Optical disc whose quality far surpasses that of CDs C. The number of bits in an area on a storage medium D. A group of two or more integrated hard disks E. Administrators can quickly add storage to their network with this kind of device F. A hard disk that uses parallel signals to transfer data, instructions, and information G. A type of SCSI that uses serial signals to transfer data, instructions, and information H. A storage device that typically uses flash memory to store data, instructions, and information I. Also called a thumb drive J. Sometimes used in descriptions of a storage device's capabilities, instead of access time K. Technology that uses radio signals to communicate with a tag placed in or attached to an object, animal, or a person L. The operating system marks bad ones as unusable when a disk is formatted M. Its reliability tends to diminish with each successive rewrite N. Optical disc that users can read but not write on or erase O. Optical disc on which users can write once, but not erase, their own items

Computer Science & Information Technology

Which file open mode would be used to write data only at the end of an existing file?

a. ios::app b. ios::in c. ios::out d. ios::trunc

Computer Science & Information Technology