A collection of worksheets is called a(n) ________

Fill in the blank(s) with correct word


workbook

Computer Science & Information Technology

You might also like to view...

The ________ expands the view of the groups within a tab in the Word Options dialog box

A) plus sign B) negative sign C) check mark D) asterisk

Computer Science & Information Technology

____ protocols, such as User Datagram Protocol (UDP), do not require an ACK.

A. Presentation-layer B. Connection-oriented C. Connectionless D. Network-layer

Computer Science & Information Technology

A ____ constantly monitors the radio frequency for attacks.

A. WIDS B. SNMP C. WLAN management system D. SFTP system

Computer Science & Information Technology

Which of the following secure protocols is MOST commonly used to remotely administer Unix/Linux systems?

A. SSH B. SCP C. SFTP D. SNMP

Computer Science & Information Technology