You may do great harm to your computer by doing any of the following, EXCEPT ________

A) deleting necessary files
B) not applying patches
C) scheduling regular virus scans
D) not creating restore points


C) scheduling regular virus scans

Computer Science & Information Technology

You might also like to view...

Write a Java method that returns a String representing a file name entered by the user.

Use the BufferedReader class to obtain input.

Computer Science & Information Technology

When might you not want to skip a tab stop?

A. Calculated field B. AutoNumber field C. Combo Box field D. Any time the field requires no data entry

Computer Science & Information Technology

Most successful wireless DoS attacks are performed at the ____ layer of the OSI model.

A. Physical B. MAC C. Network D. Application

Computer Science & Information Technology

When objects contain pointers, it is a good idea to create an explicit __________ function.

a. destructor b. copy constructor c. static constructor d. inline constructor e. None of these

Computer Science & Information Technology