After a document is saved, the name of the file displays on the ________

Fill in the blank(s) with correct word


title bar

Computer Science & Information Technology

You might also like to view...

Which of the following is a behavioral control that can be used to safeguard against the loss of integrity?

A) Rotation of duties B) Log analysis C) Code testing D) Digital signatures

Computer Science & Information Technology

By default, you cannot apply a gradient fill to text.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Match the following security terms on the left with the definitions on the right

1. Confidentiality a. the base security configuration selected by an organization 2. Integrity b. the practice of using multiple layers of security between data and the resources on which it resides and possible attackers 3. Availability c. ensuring that data is accessible when and where it is needed 4. Default stance d. prevents the disclosure of data or information to unauthorized entities 5. Defense in depth e. ensures that data is protected from unauthorized modification or data corruption

Computer Science & Information Technology

Under what conditions can you dynamically change the number of vCPUs or memory available to a guest OS?

A. The host's hardware must support hot add features via VT-x. B. The host must be using a type-2 hypervisor. C. The guest OS must be installed in a UEFI enabled VM. D. The guest OS must support the dynamic addition of CPUs and memory.

Computer Science & Information Technology