Any file you open that was downloaded from the Internet, accessed from a shared network, or received as an e-mail attachment may open in a read-only format, called ____ View.
A. Secure
B. Scanned
C. Quarantine
D. Protected
Answer: D
You might also like to view...
The _________ structure is built into C#—by default, statements execute in the order in which they appear.
Fill in the blank(s) with the appropriate word(s).
Which of the following statements about qualitative analysis is true?
A. Probability of data is required. B. It uses annualized loss expectancy to rank events. C. It is the most widely used approach to risk analysis. D. The problems associated with this risk analysis are the unreliability and inaccuracy of the data.
To use applications, a computer must be running an operating system.
Answer the following statement true (T) or false (F)
What is the cornerstone of subnetting?
A. TCP B. IP address C. Subnet mask D. Packet