The gulf between those who do and do not have access to modern information and communications technology is described as the _____.
Fill in the blank(s) with the appropriate word(s).
digital divide
Computer Science & Information Technology
You might also like to view...
The objective of a phishing attack is to entice e-mail recipients to click a bogus link where personal information can be stolen.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
You can open a port in the ____ to give remote computers access to NFS services.
A. switch B. network adapter C. firewall D. router
Computer Science & Information Technology