To enable computers to speak with each other and pass files back and forth over a network, you will need ____________________ software.

Fill in the blank(s) with the appropriate word(s).


client/server

Computer Science & Information Technology

You might also like to view...

What is the purpose of a primary key?

What will be an ideal response?

Computer Science & Information Technology

The 802.16 standard is also known as __________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Devices that use a unique personal characteristic, such as a fingerprint, in place of a password are called ________ authentication devices.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Cloaked folders and all the cloaked files those folders contain appear with red ____ in the Files panel.

A. "do not" icons next to them B. padlock icons next to them C. slashes across them D. "do not" icons across them

Computer Science & Information Technology