Rebecca and Lucy are supervising the installation of new software on their company's computers. 

To begin the software installation process, Lucy tells Rebecca to click on a compressed file with any of the following extensions EXCEPT _____.

A. .exe
B. .xls
C. .zip
D. .msi


Answer: B

Computer Science & Information Technology

You might also like to view...

Variables declared with the Integer, Decimal, and Double data types can store numbers only.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The pattern of seeds on the head of a sunflower, the geometry of a snail's shell, and even DNA gene sequencing all appear to be recursive structures.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which one of the following is a disadvantage of placing security within IT?

A. The centralizing of security and IT under the CIO B. It is attractive because security and IT possess many of the same qualities and technological skills C. The CIO would have IT implement security and is likely to back the security department in its effort to create a strong and safe information system for the organization D. Security has no independence from IT and it is hard to blow the whistle on security issues occurring within the IT department or by the CIO

Computer Science & Information Technology

You can access the Web interface of the CUPS server only through a URL starting with www.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology