The hidden attribute __________. (Choose all that apply.)

a. is used to prevent a file from being seen by other commands
b. cannot be seen unless you use the DIR UNHIDE command
c. is not listed by the DIR command by default
d. causes your files to become invisible to the OS


a. is used to prevent a file from being seen by other commands
c. is not listed by the DIR command by default

Computer Science & Information Technology

You might also like to view...

The ____________ property contains an integer value that indicates the control’s position in the tab order.

a. Tab Index b. FocusIdex c. Order Index d. Index Value

Computer Science & Information Technology

Previously, IPv6 specified that interface identifiers followed which format, which specifies a unique 64-bit interface identifier for each interface?

A. RFC 4941 B. EUI-64 C. EULA-64 D. IEEE 802.64v6

Computer Science & Information Technology

Which of the following command would you use to open multiple worksheets on the screen?

A) Go To B) Arrange All C) Split D) Rearrange

Computer Science & Information Technology

WPA2 uses Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) for integrity checking and Data Encryption Standard (DES) for encryption

Indicate whether the statement is true or false

Computer Science & Information Technology