Programs that can run from a flash drive are known as ________

a. open source software
b. portable apps
c. SaaS
d. suites


B

Computer Science & Information Technology

You might also like to view...

In Visual Basic, tooltips assist by showing a small caption about the purpose of each icon on the Toolbar. How do you make a tooltip appear?

(A) Right click the Toolbar icon and select purpose from the available options. (B) Position the mouse pointer over the icon for a few seconds. (C) Hold down a shift key, then click the appropriate Toolbar icon to display its purpose. (D) Hold down the Alt key, then click the appropriate Toolbar icon to display its purpose.

Computer Science & Information Technology

A(n) standard toolbar is the collection of buttons and tools you use to interact with a software program.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Use the ________ element to configure a table footer row group

a. thead b. tgroup c. tbody d. tfoot

Computer Science & Information Technology

Which of the following is NOT a valid rule of thumb on risk treatment strategy selection?

A. When a vulnerability exists: Implement security controls to reduce the likelihood of a vulnerability being exploited. B. When a vulnerability can be exploited: Apply layered protections, architectural designs, and administrative controls to minimize the risk or prevent the occurrence of an attack. C. When the attacker's potential gain is less than the costs of attack: Apply protections to decrease the attacker's cost or reduce the attacker's gain by using technical or operational controls. D. When the potential loss is substantial: Apply design principles, architectural designs, and technical and non-technical protections to limit the extent of the attack, thereby reducing the potential for loss.

Computer Science & Information Technology