A person is trying to hide her tracks after doing some things she shouldn't have on a computer system. She changes all of the file extensions for a bunch of document files from DOC to AVI. What does that do to the actual file?

a. Nothing
b. Microsoft Word will no longer be able to open those files.
c. The alteration changes how the file interacts with the OS and with the applications that should be able to open it.
d. The file becomes corrupted.


c. The alteration changes how the file interacts with the OS and with the applications that should be able to open it.

Computer Science & Information Technology

You might also like to view...

A recursive method .

a. is a method that calls itself. b. can be called directly. c. can be called indirectly through another method. d. All of the above.

Computer Science & Information Technology

A ________ is a connection to another area of a document or a connection to an Internet address

Fill in the blank(s) with correct word

Computer Science & Information Technology

A network protocol is special software that allows a network to use logical addressing in order to move data from one subnet to another.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

When creating a gradient, a color name or value followed by a measurement is known as a(n) __________.

A. color stop B. line C. starting point D. direction

Computer Science & Information Technology