____________________ are software programs that operate in the background and support one or more functions to keep the network running at optimal performance.?

Fill in the blank(s) with the appropriate word(s).


Utilities

Computer Science & Information Technology

You might also like to view...

A router is only used with a wireless network

Indicate whether the statement is true or false

Computer Science & Information Technology

What is a stack frame and why is it so important?

What will be an ideal response?

Computer Science & Information Technology

The _________ expression describes the root node of a document.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

____ authentication is an industry standard documented under RFC 1510 that is used with either a password or a smart card for interactive log on.

A. Kerberos B. NTLM C. LDAP D. Digest

Computer Science & Information Technology