The early DOS operating system required use of the ________ file naming convention

Fill in the blank(s) with correct word


8.3

Computer Science & Information Technology

You might also like to view...

To create or modify the design of an object, you would use the ________ view

Fill in the blank(s) with correct word

Computer Science & Information Technology

You can associate command buttons with a macro, group macros, and embed macros within a form, in addition to creating conditions that control whether a macro runs

Indicate whether the statement is true or false

Computer Science & Information Technology

Oracle requires TCP/IP with ____ and named pipes in order to communicate with other devices on a network.

A. SQL B. XPS C. SSL D. WPS

Computer Science & Information Technology

________ uses email messages that appear to be from trusted websites to trick you into revealing personal information.

a. Phishing b. Pharming c. Spam d. Botnet

Computer Science & Information Technology