A collection of worksheets is called a(n) ________
Fill in the blank(s) with correct word
workbook
Computer Science & Information Technology
You might also like to view...
The ________ expands the view of the groups within a tab in the Word Options dialog box
A) plus sign B) negative sign C) check mark D) asterisk
Computer Science & Information Technology
____ protocols, such as User Datagram Protocol (UDP), do not require an ACK.
A. Presentation-layer B. Connection-oriented C. Connectionless D. Network-layer
Computer Science & Information Technology
A ____ constantly monitors the radio frequency for attacks.
A. WIDS B. SNMP C. WLAN management system D. SFTP system
Computer Science & Information Technology
Which of the following secure protocols is MOST commonly used to remotely administer Unix/Linux systems?
A. SSH B. SCP C. SFTP D. SNMP
Computer Science & Information Technology