The ________ holds Windows snap-in tools used to maintain the computer as well as enables access to Device Manager, shared folders, and performance logs
A) Device Manager
B) Management Console
C) System Manager
D) Modem Manager
B
You might also like to view...
Public key encryption is more secure than symmetric encryption because it uses different keys for encryption and decryption
Indicate whether the statement is true or false.
Colors that are descriptive of the flavors contained in a package can be copyright protected.
a. true b. false
Answer the following statement(s) true (T) or false (F)
1. For keywords pertaining to academic research, Google returns more relevant and reliable results than Google Scholar, since Google Scholar is a subsidiary of the larger umbrella of Google. 2. Phishing emails are disguised as emails from a trusted source and sent by hackers; they deceive the recipient by getting them to reveal personal or financial information. 3. Speech recognition software allows a device like a laptop or smartphone to recognize the user's voice. 4. The direction in which text is printed on a page is called style. 5. The practice of social curation is when a website provides links to other relevant websites in its field.
Which of the following methods should a technician perform to properly clear a hard drive before disposal?
A. Delete the FAT B. Zero all block sectors C. Delete the partition D. Zero the NTFS journal