This preview shows page 1. Sign up to view the full content.
Unformatted text preview: 5. A(n) __________________ uses infrared technology to detect movement. 6. A(n) ______________ is designed to show any attempt to open or unlock a case. 7. To provide security for network traffic, data can be __________________, which refers to the process of encoding the data. 8. A(n) ________________ is a dedicated connection, similar to a leased telephone line. 9. A(n) _________________ is the main line of defense between a local network, or intranet, and the Internet. 10. A system becomes _______________ when users no longer require its functions or when the platform becomes outmoded....
View Full Document
This note was uploaded on 10/05/2011 for the course ECON 2301 taught by Professor Econmaster during the Spring '11 term at Dallas Colleges.
- Spring '11