A finite set of two or more symbols is called a(n) ___________ .

A. character
B. alphabet
C. radix
D. character string


B. alphabet

Computer Science & Information Technology

You might also like to view...

LinkedIn is used primarily by ________

A) students B) educators C) parents D) business professionals

Computer Science & Information Technology

A hyperlink in a worksheet may take you to which of the following locations ________

A) links dialog box B) a page break C) another location in the worksheet or the company intranet D) home

Computer Science & Information Technology

In order to make a forensically sound copy of a hard disk for analysis, it is critical that you employ a write-blocker. What does this device do that makes for a sound copy?

a. It performs bit by bit error correction of each sector of the source hard disk as it is copied to the target medium. b. It prevents rootkits from destroying the data when it detects the lauch of a copy routine. c. It prevents the OS from making any changes to the metadata of files as they are being copied. d. It is capable of reading the system files that are generally invisible to the host operating system of the target device.

Computer Science & Information Technology

What type of survey can help a network administrator make decisions about bands, channels, and widths when installing new access points?

A. wireless B. site C. frequency D. architectural

Computer Science & Information Technology