Internet services include ____.

A. viewing documents
B. file transfer
C. emailing
D. all of the above

Answer: D

Computer Science & Information Technology

You might also like to view...

The ________ of the query design grid is used to set the rules that determine which records of a table will be selected

Fill in the blank(s) with correct word

Computer Science & Information Technology

Which of the following attack types is being used if the originating IP address has been spoofed?

A. Ping flood B. Trojan C. Smurf D. Worm

Computer Science & Information Technology