This preview shows page 1. Sign up to view the full content.
Unformatted text preview: d. is prohibited by the Department of Homeland Security. 8. Which is a key component of cloud computing? a. Increase in IT employee headcount b. Decreased computing start-up costs c. Delivery of offline computing services d. Difficulty in increasing computing capacity 9. The costs associated with running the Internet are paid primarily through ISPs collecting fees from customers and from funding by U.S. government agencies. a. True b. False 10. VoIP uses packet switching technology. a. True b. False 11. A computer needs the XML address to locate a Web page accurately. a. True b. False 12. The main suite of protocols used on the Internet is TCP/FTP. a. True b. False 13. Instant messages are generally secure because most instant messaging software provides for encryption of messages. a. True b. False 1...
View Full Document
This note was uploaded on 02/09/2012 for the course ISDS 1100 taught by Professor Landry during the Fall '08 term at LSU.
- Fall '08