If you receive a file from someone else, which you then modify and use, the original author's name:

A) is replaced by your name. B) is saved in a different file.
C) is replaced by a search engine. D) remains with the file.


D

Computer Science & Information Technology

You might also like to view...

The __________ class is used to create a menu bar.

a. MenuBar b. Menu c. MenuItem d. Bar

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

1) An indirect method of deadlock prevention is to prevent the occurrence of a circular wait. 2) If access to a resource requires mutual exclusion then mutual exclusion must be supported by the OS 3) The OS may preempt the second process and require it to release its resources if a process requests a resource that is currently held by another process. 4) Deadlock avoidance requires knowledge of future process resource requests. 5) An unsafe state is one in which there is at least one sequence of resource allocations to processes that does not result in a deadlock.

Computer Science & Information Technology

A(n) ________ virus is designed to infect multiple file types in an effort to fool antivirus software

Fill in the blank(s) with correct word

Computer Science & Information Technology

____ interpolation averages the color values of surrounding pixels.

a. Nearest Neighbor b. Bilinear c. Bicubic d. Bicubic Smoother

Computer Science & Information Technology