A(n) ____________________ is a separate network that sits outside the secure network perimeter and is protected by a firewall.

Fill in the blank(s) with the appropriate word(s).


DMZ

Computer Science & Information Technology

You might also like to view...

____________ is a free programming environment that is available for download from the Microsoft Web site.

a. Visual Studio 2015 Community Edition b. Visual Studio 2015 Professional c. The MSDN library d. Internet Explorer

Computer Science & Information Technology

The _________________________ contains commands related to changing the appearance of text in a document.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

_____ is the process of detecting andĀ then correcting or deleting incomplete, incorrect, inaccurate, irrelevantĀ records that reside in a database.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

When using inheritance, the child class is also known as a ________ class.

A) parent B) derived C) primary D) secondary

Computer Science & Information Technology