__________ are examples of thin clients.

a) Applications that require minimal client-side support
b) Applications that require minimal server-side support
c) Applications that use JSP or servlets
d) Applications that do not use JSP and servlets


a) Applications that require minimal client-side support

Computer Science & Information Technology

You might also like to view...

What is a method considered to be when there is a potential for a situation in which the compiler cannot determine what method to use?

A. overloaded B. ambiguous C. polymorphic D. hidden

Computer Science & Information Technology

?Many organizations use _______ to provide a comprehensive display of all vital data related to an organization's security defenses, including threats, exposures, policy compliance, and incident alerts.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

James recently received a secret message from Martha containing an order for custom services. He would like to be able to prove that Martha sent the message and that is could not be forged. What cryptographic goal is James attempting to achieve?

a. Confidentiality b. Nonrepudiation c. Security though obscurity d. Integrity e. Authentication

Computer Science & Information Technology

A common attack against converged network communications is eavesdropping. How can this attack be prevented?

A. Use a VPN. B. Deploy multi-factor authentication. C. Use strict sequencing rules. D. Implement DHCP.

Computer Science & Information Technology