The early DOS operating system required use of the ________ file naming convention
Fill in the blank(s) with correct word
8.3
Computer Science & Information Technology
You might also like to view...
To create or modify the design of an object, you would use the ________ view
Fill in the blank(s) with correct word
Computer Science & Information Technology
You can associate command buttons with a macro, group macros, and embed macros within a form, in addition to creating conditions that control whether a macro runs
Indicate whether the statement is true or false
Computer Science & Information Technology
Oracle requires TCP/IP with ____ and named pipes in order to communicate with other devices on a network.
A. SQL B. XPS C. SSL D. WPS
Computer Science & Information Technology
________ uses email messages that appear to be from trusted websites to trick you into revealing personal information.
a. Phishing b. Pharming c. Spam d. Botnet
Computer Science & Information Technology