If you inadvertently delete a needed file from your computer's Documents folder, in Windows 8.1, you can recover it by ________

A) restoring it from the Recycle Bin
B) undoing it by going into the trash
C) emptying the Recycle Bin
D) restoring the trash


A

Computer Science & Information Technology

You might also like to view...

Which of the following describes an AnchorPane?

a. Enables you to set the position of child nodes relative to the pane’s edges. Resizing the pane does not alter the layout of the nodes. b. Includes five areas—top, bottom, left, center and right—where you can place nodes. The top and bottom regions fill its width and are vertically sized to their children’s preferred heights. The left and right regions fill its height and are horizontally sized to their children’s preferred widths. The center area occupies all of its remaining space. You might use the different areas for tool bars, navigation, a main content area, etc. c. Lays out nodes consecutively—either horizontally or vertically. When the boundary for the pane is reached, the nodes wrap to a new line in a horizontal pane or a new column in a vertical pane. d. Creates a flexible grid for laying out nodes in rows and columns.

Computer Science & Information Technology

Which of the following is not an example of a standard?

A) Passwords must include at least one special character. B) Passwords must not include repeating characters. C) Pass phrases make good passwords. D) Passwords must not include the user’s name.

Computer Science & Information Technology

Match each item with a statement below.

A. A connectionless protocol that uses IP to get packets from one computer to another. B. A connectionless protocol used for sending and receiving requests between the client and server on a network. C. A protocol used to generate IP error messages. D. A protocol used to send e-mail in user-level client applications. E. A virtual terminal protocol for connecting to a remote computer. F. A protocol used to map a fully qualified domain name with an IP address. G. A connection-oriented protocol responsible for keeping track of packets and reassembling them into a single file after they have all arrived. H. A protocol used to move files from one computer to another efficiently and accurately. I. A protocol that handles the delivery of data as packets.

Computer Science & Information Technology

You can save disk space by inserting the link as a(n) ________ instead of displaying the actual linked data, since the data are not repeated or duplicated in the destination file

A) file B) icon C) object D) image

Computer Science & Information Technology