A data file is one that _____.
A. a user can work with or manipulate
B. instructs a computer to perform a task
C. is not saved to a specific location
D. contains a program or an app
A. a user can work with or manipulate
You might also like to view...
Answer the following statements true (T) or false (F)
1. GUIs popularized the use of the keyboard as an input device. 2. Once a GUI interface has been designed for a desktop or laptop computer, it will normally work just as well on any mobile device. 3. Most mobile devices come equipped with specialized hardware that gives them capabilities which are not available on laptop or desktop computers. 4. If a program needs to display, for example, some initial data in a Label component when the application starts running, this can be done by including an Init module.
Protected members of a base class are like ________, with the exception that they may be accessed by derived classes.
A) constructor functions B) static members C) private members D) public members E) None of the above
What does each iteration of the insertion sort algorithm do?
a. Each iteration takes the next smallest element and inserts it at the beginning of the array. b. Each iteration takes the next element in the unsorted portion of the array and inserts it into the sorted portion. c. Sorted subarrays are inserted into the larger array. d. Each iteration determines the location of a pivot and inserts it into place.
Which of the following should NOT be done if Access give you a security warning about your database?
A) Run a virus scan on any file before you say it should be trusted. B) If you know the database is safe, you can trust a database permanently by storing it in a trusted location. C) Do not click Enable Content in the security warning if you are not sure if the database is safe. D) Enable the content. Nothing bad will happen, even if there is a virus embedded in the file.