Which of the following broadband technologies would typically have a different uplink and downlink speed?
Which of the following computing techniques will limit the vulnerability of a system to infection by a virus? (Select TWO)