Unformatted text preview: 5. A(n) __________________ uses infrared technology to detect movement. 6. A(n) ______________ is designed to show any attempt to open or unlock a case. 7. To provide security for network traffic, data can be __________________, which refers to the process of encoding the data. 8. A(n) ________________ is a dedicated connection, similar to a leased telephone line. 9. A(n) _________________ is the main line of defense between a local network, or intranet, and the Internet. 10. A system becomes _______________ when users no longer require its functions or when the platform becomes outmoded....
View Full Document
- Spring '11
- Computer network, Telephone line, Short Answer Instructions