Programs are identified by name in a disk’s __________.
a. IOCS
b. directory
c. file system
d. they aren't
b. directory
You might also like to view...
_________ involves maneuvering in a car with a portable device looking for unsecured Wi-Fi networks to connect to. A. War driving B. Wi-Fi piggybacking C. Cyber steering D. Virtual sponging
Fill in the blank(s) with the appropriate word(s).
The SelectedIndex property of a ComboBox returns the value of the list item that was selected by the user.
Answer the following statement true (T) or false (F)
COGNITIVE ASSESSMENT What is the purpose of an Internet Protocol address (IP address)?
A. It specifies whether a computer is using a broadband network or a direct-dial network. B. It differentiates between a server computer and a client computer and contains codes to identify whether the computer can send data or receive data. C. It contains the protocol schema used to identify whether the computer is on a wired or wireless network. D. It uniquely identifies the location of each computer or device connected to the Internet.
Which of the following can be used to block unauthorized access while allowing authorized communications on a device or network?
A. Network router B. Personal firewall C. Hardware that uses NAT (network address translation) D. All of the above