Most software programs can both save and retrieve data in a(n) _______ file format.
A. HTML
B. text
C. spreadsheet
D. picture
Answer: B
You might also like to view...
The interface that controls a peripheral device is limited to a few __________ operations.
a. logical b. physical c. machine language d. primitive
What is defined as specific avenues that threat agents can exploit to attack an information asset?
A. liabilities B. defenses C. vulnerabilities D. obsolescence
What does a programmer need to know in order to use two variables with the same name in a class?
What will be an ideal response?
A technician receives a work order that a user can no longer access any external websites. The user is the only one affected, but can still access websites by IP address. Which of the following is the MOST likely cause?
A. The workstation has been removed from the domain and needs to be re-added in directory services. B. The workstation is configured to use the IPv4 protocol instead of IPv6. C. The workstation is configured with an incorrect IP address of the DNS server. D. The workstation's DHCP IP address has expired and has assigned itself an APIPA address.