By pressing the ________ keys simultaneously you can scroll through open apps

A) Ctrl and Alt B) Alt and Enter C) Tab and Ctrl D) Alt and Tab


D

Computer Science & Information Technology

You might also like to view...

You can use __________ to create files under the UNIX/Linux graphical user interface.

a. vi b. text c. Kwrite d. none of the above

Computer Science & Information Technology

All of the following are unwanted software a hacker could install on your computer, EXCEPT ________

A) keystroke loggers B) ghosts C) Trojan horses D) rootkits

Computer Science & Information Technology

FIGURE 8-1Figure 8-1 above shows the interface for a ____-controlled program.

A. count B. menu C. query D. sentinel

Computer Science & Information Technology

What statement reflects a valid approach to improving performance and security on a virtual server that accesses shared storage over the network, in addition to providing networking services?

A. The host should be placed in a special VLAN along with the storage to isolate access. B. The host should be configured to use the same virtual network switch for both accessing shared storage and providing services. C. The host should be configured to use the same network interfaces in a bonded group to access storage as well as provide network services. D. The host should be configured to use separate network adapters for accessing storage and providing services.

Computer Science & Information Technology