This preview shows page 1. Sign up to view the full content.
Unformatted text preview: battery backup with suitable capacity. 7. A(n) ____ is the main line of defense between a local network, or intranet, and the Internet. 8. ____ includes worms, Trojan horses, keystroke loggers, and spyware. 9. ____ involves restoring the data and restarting the system after an interruption. 10. In a broad sense, ____ include formal degrees, diplomas, or certificates that show that a certain level of education has been achieved successfully....
View Full Document
- Spring '12