A(n) ________ is used to provide explanatory information about the macro or the action
A) condition
B) command
C) argument
D) comment
D
You might also like to view...
A(n) ____________________ lets you record information about people.
Fill in the blank(s) with the appropriate word(s).
The file that contains code written by the programmer is the ____.
A. Application file B. Executable file C. Object file D. Source file E. Text file
________ techniques include creating viruses and worms, performing denial-of-service (DoS) attacks as well as establishing unauthorized remote access connections to a device using Trojans/backdoors, creating botnets, packet sniffing, phishing, and password cracking.
A. Personal-hacking B. Network-hacking C. Server-hacking D. Intelligence-hacking
An administrator needs to back up files from a server to the cloud. The administrator must select the most efficient type of backup technology that will update file changes the fastest and utilize the least amount of bandwidth. Which of the following backup technologies should the administrator select?
A. File-level backups B. Block-level backups C. Snapshot-level backups D. Folder-level backups