After a document is saved, the name of the file displays on the ________
Fill in the blank(s) with correct word
title bar
You might also like to view...
Which of the following is a behavioral control that can be used to safeguard against the loss of integrity?
A) Rotation of duties B) Log analysis C) Code testing D) Digital signatures
By default, you cannot apply a gradient fill to text.
Answer the following statement true (T) or false (F)
Match the following security terms on the left with the definitions on the right
1. Confidentiality a. the base security configuration selected by an organization 2. Integrity b. the practice of using multiple layers of security between data and the resources on which it resides and possible attackers 3. Availability c. ensuring that data is accessible when and where it is needed 4. Default stance d. prevents the disclosure of data or information to unauthorized entities 5. Defense in depth e. ensures that data is protected from unauthorized modification or data corruption
Under what conditions can you dynamically change the number of vCPUs or memory available to a guest OS?
A. The host's hardware must support hot add features via VT-x. B. The host must be using a type-2 hypervisor. C. The guest OS must be installed in a UEFI enabled VM. D. The guest OS must support the dynamic addition of CPUs and memory.