Ad hoc mode is also known as _______________ mode.
Fill in the blank(s) with the appropriate word(s).
peer-to-peer
correct
Computer Science & Information Technology
You might also like to view...
The size of the ____________________ space in a security plan is typically dictated by the security resources that are available and the required level of security.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
A(n) ________________ is a statement that is used to assign a value to a variable.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
Recent studies indicate that the emergence of cloud computing and removable media has effectively decreased theft of information or breaches in digital security
Indicate whether the statement is true or false.
Computer Science & Information Technology
Which of the following cannot be a target?
A. Web site home page B. hyperlink C. Word document D. Excel worksheet
Computer Science & Information Technology