Select the invalid date from the list below:

a. February 29, 2000
b. February 29, 1900
c. February 29, 1804
d. February 29, 1708
e. None of the above


b. February 29, 1900

Computer Science & Information Technology

You might also like to view...

Word has several built-in styles; new styles CANNOT be created

Indicate whether the statement is true or false

Computer Science & Information Technology

An unauthorized programming code in a macro that erases or damages files is called a macro ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

In the Windows operating systems, deleting a file performs which of the following actions on the data stored on the surface of the medium?

a. Nothing happens to the data at this point. It is simply moved from the original folder to a hidden folder in the Recycle Bin. b. Nothing happens to the data at this point. The allocation marker for the file is simply reset. c. A random deluge of zeroes and ones is copied over the original data. d. The entry for the file is purged from the $MFT metadata file in the file system.

Computer Science & Information Technology

To make changes to Internet Explorer policies that correspond to an OU, you need a domain controller

Indicate whether the statement is true or false

Computer Science & Information Technology