____________________ are software programs that operate in the background and support one or more functions to keep the network running at optimal performance.?
Fill in the blank(s) with the appropriate word(s).
Utilities
Computer Science & Information Technology
You might also like to view...
A router is only used with a wireless network
Indicate whether the statement is true or false
Computer Science & Information Technology
What is a stack frame and why is it so important?
What will be an ideal response?
Computer Science & Information Technology
The _________ expression describes the root node of a document.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
____ authentication is an industry standard documented under RFC 1510 that is used with either a password or a smart card for interactive log on.
A. Kerberos B. NTLM C. LDAP D. Digest
Computer Science & Information Technology