_________ technology divides a message into several packets that can be routed independently to their destination.
A. Handshaking
B. Packet switching
C. Packet sniffing
D. Circuit switching
Answer: B
You might also like to view...
Answer the following statements true (T) or false (F)
1. A view cannot provide restricted access to a relational database so it cannot be used for security purposes. 2. The database management system makes use of the database description tables to manage the physical database. 3. Two disadvantages to database encryption are key management and inflexibility. 4. Fixed server roles operate at the level of an individual database. 5. SQL Server allows users to create roles that can then be assigned access
Once a computer program is compiled, the IDE will produce a(n) ________ file that can be run by the operating system on a user's computer.
A. beta B. executable C. algorithm D. alpha