By right-clicking the file name and selecting the ____ option, you can open a file by selecting the application used.

A. Share
B. Create shortcut
C. Copy
D. Open with


Answer: D

Computer Science & Information Technology

You might also like to view...

What happens when you double-click the title bar?

A) The window is maximized or restored down. B) The window is closed. C) The window is minimized. D) A copy of the window is created.

Computer Science & Information Technology

Disks that are formatted using the GUID Partitioning Table (GPT) can hold larger volume sizes, and benefit from increased reliability provided by which feature below?

A. Cyclic Redundancy Check (CRC) B. Message Digest 5 (MD5) C. Secure Hash Algorithm (SHA) D. Journaling

Computer Science & Information Technology

Match each item with a statement below.

A. Uses two keys: one to encrypt data and one to decrypt data B. Encryption algorithm used for the Data Encryption Standard C. Uses a single key to encrypt and decrypt data D. A digital document that verifies the two parties exchanging data over the Internet are really who they claim to be E. Used for verification, takes a variable-length input and converts it to a fixed-length output string F. Used to find the same hash value for two different inputs and reveal any mathematical weaknesses in a hashing algorithm G. Operate on plaintext one bit at a time H. A structure consisting of programs, protocols, and security policies for encrypting data and uses public key cryptography to protect data transmitted over the Internet I. A sequence of random bits generated from a range of allowable values J. The use of random data alongside plaintext as an input to a hashing function so that the output is unique

Computer Science & Information Technology

?The SSH service listens on what TCP port?

A. ?20 B. ?21 C. ?22 D. ?23

Computer Science & Information Technology