________ encrypt connections between company networks and remote users, such as workers connecting from home, creating a secure virtual connection to a company LAN across the Internet.

A. Web bugs
B. Loggers
C. Biometrics
D. Virtual private networks


Answer: D

Computer Science & Information Technology

You might also like to view...

If you wanted to search for all customers who live outside of the USA, you would type _________ "USA" as the criterion in the Country field

A) Between...And B) Not Between...And C) Not D) In

Computer Science & Information Technology

Use the ________ tab to check for issues in the Compatibility Checker

Fill in the blank(s) with correct word

Computer Science & Information Technology

Data from a table imported from Excel must be modified in Excel

Indicate whether the statement is true or false

Computer Science & Information Technology

AC Case 5-1Ms. West is a fourth grade teacher in a self-contained classroom. She keeps track of her students' attendence, homework, projects, and scores in an Access database. At the end of the year, she wants to provide each parent or guardian with a printed report containing this information. Which of the following is NOT an example of a control that Ms. West could add to a report using a button in the Controls group?

A. Page Number B. Text Box C. Hyperlink D. Chart

Computer Science & Information Technology