In an MS-DOS COPY command, if a file name is specified for the destination file, the __________ is used.

a. source file name
b. default file name
c. new file name
d. You cannot specify a destination file name.


c. new file name

Computer Science & Information Technology

You might also like to view...

Which type of DoS attack targets an individual client and spoofs a deauthentication frame from the WAP to the victim?

a. Authentication flood attack b. Deauthentication flood attack c. Network jamming attack d. Equipment destruction attack

Computer Science & Information Technology

Which of the following is not true when safeguarding your data on the Internet?

a. Surf the Web anonymously by using software products to protect your data and encrypt your online communications. b. It is a good idea to complete all registration forms on all web pages. c. Use a throwaway e-mail address from a free Web-based service such as Google's Gmail for mailing lists and chat rooms. d. Instruct children not to divulge any personal information online without first asking a parent or teacher for permission

Computer Science & Information Technology

The result of =PROPER("KANSAS") is ________

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

What is the decimal equivalent to the binary number 11100000?

A. 98 B. 160 C. 196 D. 224

Computer Science & Information Technology