When applying the design principle of __________ related items are grouped together
a. linear
b. proximity
c. repetition
d. alignment
b
You might also like to view...
Which firewall-cmd command would verify that the FTP service was trusted in the runtime configuration? In the permanent configuration?
What will be an ideal response?
Which of the following is true about the steps in setting up and using an IDPS?
A. anomaly-based systems come with a database of attack signatures B. sensors placed on network segments will always capture every packet C. alerts are sent when a packet doesn't match a stored signature D. false positives do not compromise network security
A program or class that instantiates objects of another prewritten class is a ____ or class user.
A. class slave B. class object C. class master D. class client
A 10BaseT network uses __________________ connectors.
Fill in the blank(s) with the appropriate word(s).