The technique of connecting a device to each subsequent device (instead of back to the computer) is known as ____________________.?
Fill in the blank(s) with the appropriate word(s).
daisy-chaining
Computer Science & Information Technology
You might also like to view...
How is programming debugging similar to testing with a prototype?
What will be an ideal response?
Computer Science & Information Technology
?What occurs when someone steals personal or confidential information?
A. information theft B. corruption C. fraud D. compaction
Computer Science & Information Technology