__________ is a destructive command.
a. COPY
b. DIR
c. MKDIR
d. FORMAT
b. DIR
Computer Science & Information Technology
You might also like to view...
When a disk has been prepared to store data, it has been
A) Formatted B) Cleaned C) Enabled D) Tracked
Computer Science & Information Technology
A copyright holder has total control over how a work may be used.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
Customer relationship management (CRM) and product life cycle management (PLM) are common types of:
a. personal systems. b. group systems. c. resource planning systems. d. enterprise systems.
Computer Science & Information Technology
List five different categories of utility tools support agents find useful to provide greater security for end users.
What will be an ideal response?
Computer Science & Information Technology