_________ share(s) the processing of a task across multiple computer systems

a. Distributed computing
b. Supercomputers
c. Enterprise servers
1.The hardware components that serve the input, output, and storage functions of a computer are called _____.
a. central processing units
b. control units
c. peripheral devices


c. peripheral devices

Computer Science & Information Technology

You might also like to view...

In addition to hiding the implementation details that the ordinary method of “separating implementation from interface” would hide, using a proxy class also hides:

a. The definition of inline functions. b. The definition of access functions. c. The definition of constructors and the destructor. d. The names of private data members.

Computer Science & Information Technology

Recently, your company implemented two wireless networks. Within days of implementation, you discover that unauthorized devices have connected to the wireless networks. You need to ensure that unauthorized devices are unable to connect to either wireless network. What should you do?

A. Deploy the wireless access points behind a firewall. B. Deploy the wireless access points behind an intrusion prevention system (IPS). C. Employ MAC filtering on the wireless access points. D. Disable SSID broadcast on the wireless access points.

Computer Science & Information Technology

_____ goals contains numeric or descriptive measures that define criteria such as quantity and cost so that progress toward meeting the goal can be determined.

a. Measurable b. Specific c. Generalized d. Vague

Computer Science & Information Technology

The ____ cable is similar to fiber-optic cable in that it is as thin as a hair and transparent. The big difference, however, is that this new cable is full of holes.?

A. ?photonic fiber B. ?single-stranded coaxial C. ?thick coaxial D. ?thin coaxial

Computer Science & Information Technology