A collection of information stored on a computer under a single name is called a(n):

A) program B) folder C) file D) operating system


C

Computer Science & Information Technology

You might also like to view...

Because of its purpose, the ____ stage is the appropriate place for cybersecurity professionals to be involved in software assurance.

A. review B. specification C. design D. testing

Computer Science & Information Technology

In the tag, the ____ attribute is used to indicate the source of the file used in the object.

A. data B. classid C. source D. codebase

Computer Science & Information Technology

Identify the process in a disaster recovery plan that is responsible for contracts and payroll information.

a. Identify vital records and data b. Define resources and actions to recover c. Define emergency procedures d. Conduct a business impact analysis

Computer Science & Information Technology

Which of the following Fade options decreases the brush stroke opacity toward the end of the stroke?

A. Size Jitter B. Foreground Jitter C. Background Jitter D. Opacity Jitter

Computer Science & Information Technology