__________ is not a pure P2P application.

a) Gnutella
b) KaZaA
c) FreeNet
d) all of the above


b) KaZaA

Computer Science & Information Technology

You might also like to view...

he Callable interface (of package java.util.concurrent) declares a single method named call that allows a task to return a value.

a. call b. execute c. invoke d. None of the above.

Computer Science & Information Technology

The mv utility (Sobell, page 53) renames a file. Use mv to rename the copy of the file you made in step 4.

What will be an ideal response?

Computer Science & Information Technology

The Lookup ________ helps you create a lookup field.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Which of the following security awareness training is BEST suited for data owners who are concerned with protecting the confidentiality of their data?

A. Social networking use training B. Personally owned device policy training C. Tailgating awareness policy training D. Information classification training

Computer Science & Information Technology