FTP is secured by requiring usernames and passwords and _________
a. Smart cards
b. Biometric scanning
c. Encryption of transmissions
d. Voice recognition
C.
Computer Science & Information Technology
You might also like to view...
The following algorithm represents the ____.Function Numeric unKnown(Numeric x, Numeric y) If y = 0 Then Return x Else Return GCD(y, x % y) End IfEnd Function
A. sum of squares B. Fibonacci series C. GCD function D. factorial series
Computer Science & Information Technology
The _________________________ contains commands related to changing the appearance of text in a document.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology