The process of accessing a computer from outside of a company is referred to as ________

A) outsourcing B) ergonomics C) hacking D) hop-off gateway

C

Computer Science & Information Technology

You might also like to view...

Personal information can be found and removed in a document using the ________

A) Accessibility Check B) Document Inspector C) Submit Inspector D) Compatibility Check

Computer Science & Information Technology

When running a Windows server, which option is used with the ping command to define the number of packets transmitted?

A. -n B. -a C. -r D. -v

Computer Science & Information Technology