A set of characters at the end of a file name that helps Windows Vista determine what program should open the file is called the ________

Fill in the blank(s) with correct word


file name extension

Computer Science & Information Technology

You might also like to view...

Which command would a technician use to apply a new group policy to a computer?

A) gpupdate B) services.msc C) regedit D) cipher

Computer Science & Information Technology

In Slide Show view, each slide ____.

A. takes up 1/4 the screen B. takes up 1/2 the screen C. fills the entire screen D. fills the center of the screen with room for editing

Computer Science & Information Technology

As an investigator, you are charged with creating a timeline of a user's Internet activity on a company computer. When going into the user's temporary Internet files, you see that the directory is empty. You know that the company has a policy restricting the person from seeing hidden directories on the system, so it is unlikely that they were able to delete them. How is it possible that this

directory is empty? a. The user is implementing a rootkit that bypasses system security and gives them access to the directory. b. The user has configured Internet Explorer to delete the history every time she logs off. c. The user has selected the box in Temporary Internet Files and History that says, "Every time I start Internet Explorer." d. This isn't possible. IE always stores cached files permanently.

Computer Science & Information Technology

Which type of connector do 1000BaseT networks use?

a. twinax b. LC c. SC d. RJ-45

Computer Science & Information Technology