A ____ is a system that has no CPU and that accesses a mainframe computer to perform all program execution and processing on the mainframe.
A. hybrid terminal
B. basic terminal
C. stripped terminal
D. thin client
Answer: B
You might also like to view...
You can utilize a keyboard ________ by pressing a key or combination of keys to perform a task that would otherwise require a mouse
A) linked key B) shortcut C) function key D) fast key
To show the same formatted placeholder on multiple slides, you can customize the ____ master.
A. slide B. placeholder C. text D. layout
COGNITIVE ASSESSMENT A thief has unfortunately captured your ATM card number by placing a panel on top of the face of an ATM, which was virtually undetectable to you. What is this technology called?
A. skimmer B. PIN CAPTCHA C. digimask D. transaction thief
Answer the following statements true (T) or false (F)
1. A denial-of-service attack is an attempt to compromise availability by hindering or blocking completely the provision of some service. 2. DoS attacks cause damage or destruction of IT infrastructures. 3. A DoS attack targeting application resources typically aims to overload or crash its network handling software. 4. The SYN spoofing attack targets the table of TCP connections on the server. 5. A cyberslam is an application attack that consumes significant resources, limiting the server’s ability to respond to valid requests from other users.