Internet services include ____.
A. viewing documents
B. file transfer
C. emailing
D. all of the above
Answer: D
Computer Science & Information Technology
You might also like to view...
The ________ of the query design grid is used to set the rules that determine which records of a table will be selected
Fill in the blank(s) with correct word
Computer Science & Information Technology
Which of the following attack types is being used if the originating IP address has been spoofed?
A. Ping flood B. Trojan C. Smurf D. Worm
Computer Science & Information Technology