Each node in a ________ list contains pointers to the nodes before and after it.
A) singly-linked
B) doubly-linked
C) circular-linked
D) both B and C
E) None of the above
B) doubly-linked
You might also like to view...
What type of multitasking did older OSs use, which allowed a process to monopolize the CPU's time until the process had completed its own task?
A. contextual B. cooperative C. preemptive D. precocious
Match each item with a statement below.
A. the process of identifying who has access to the network B. the process of granting or denying an authenticated user's access to network resources C. a text file that contains a list of commands D. a property of a group that determines the reach of a group's application in a domain E. an OS client component that intercepts resource requests F. the Windows file sharing protocol G. a type of group in Windows in which membership is controlled dynamically by Windows H. a group scope that can contain users from any domain and be assigned permissions to resources in any domain I. a group scope used mainly to group users from the same domain who have similar access and rights requirements J. the native Linux/UNIX file sharing protocol
The primary way to set NTFS permissions is through the _______________ tab under the folder or files Properties.
Fill in the blank(s) with the appropriate word(s).
Wardriving software that is specifically designed to pick up a radio frequency WLAN signal is known as a ____.
A. sled B. client utility C. freeware discovery application D. WZC