Sometimes opposing attorneys ask several questions inside one question; this practice is called a ____ question.

A. leading
B. hypothetical
C. compound
D. rapid-fire


Answer: C

Computer Science & Information Technology

You might also like to view...

In the XML of a Web feed, the presence of the tag indicates that a feed is in ____ format.

A. RSS B. podcast C. Atom D. Web feed

Computer Science & Information Technology

A(n) ____________________ file contains compressed copies of a file or files.?

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

If a computer is not equipped with a TPM chip, how can a computer make use of BitLocker Drive Encryption?

A. The computer will require the use of a smart card reader that can be used to authenticate the user. B. The computer will require a password on a cold start up to ensure that the drive contents are accessed by authorized users. C. The computer will utilize BitLocker encryption, but security will be provided at the software level as opposed to the hardware level. D. The computer will require a USB flash drive that contains a personal identification number used to start the computer and secure the drive.

Computer Science & Information Technology

You can determine the relative risk for each of the organization's information assets using a process called risk ____________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology