When you draw a hierarchy chart, you use more of a "____" approach.

A. big picture
B. small picture
C. detail-oriented
D. focused view


Answer: A

Computer Science & Information Technology

You might also like to view...

Select the term below that describes a virtual wallet that can be used for mobile or online payments.

a. symmetric encryption b. e-wallet c. digital wallet d. merchant account

Computer Science & Information Technology

Which of the following is not a type of server?

(a) Web server. (b) word processing server. (c) database server. (d) e-mail server.

Computer Science & Information Technology

Specifying a port that is already in use or specifying an invalid port number when creating a DatagramSocket results in a __________.

a. SocketException. b. PortInUseException. c. PortException. d. ConnectException.

Computer Science & Information Technology

Which of the following are weaknesses in WEP that allow it to be easily cracked? (Select all that apply.)

A. size of the encryption key B. use of AES C. use of 802.1X D. faulty implementation of the RC4 protocol E. both A and D

Computer Science & Information Technology