The gulf between those who do and do not have access to modern information and communications technology is described as the _____.

Fill in the blank(s) with the appropriate word(s).

digital divide

Computer Science & Information Technology

You might also like to view...

The objective of a phishing attack is to entice e-mail recipients to click a bogus link where personal information can be stolen.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

You can open a port in the ____ to give remote computers access to NFS services.

A. switch B. network adapter C. firewall D. router

Computer Science & Information Technology