Match the following Windows features to their description
I. File Explorer
II. Status bar
III. Taskbar
IV. Rename
V. Subfolder
A. Located at the bottom of the window
B. Used to create and manage folders and files
C. A folder within a folder
D. Select a file and press F2
E. Horizontal bar at the bottom of screen
B, A, E, D, C
You might also like to view...
How does the key size affect the strength of an encryption algorithm?
What will be an ideal response?
What is the role of the media access control (MAC) sublayer of the Data Link layer?
What will be an ideal response?
Discuss the public key encryption technique.
What will be an ideal response?
Identify the attack in which a malicious hacker floods a target site with demands for data and other small tasks.
a. Distributed denial-of-service b. Smishing c. Logic bomb d. Phishing