When software is uninstalled or removed from the system, the _____ files have to be modified accordingly.

A. Registry
B. Buffer
C. Program
D. System


Answer: A

Computer Science & Information Technology

You might also like to view...

A DDR4 DIMM running at a speed of 2666 MHz has what PC rating?

A. PC4-17000 B. PC4-24000 C. PC4-21300 D. PC4-30000

Computer Science & Information Technology

When both parties prove their identities to the other, this is called ________.

mutual authentication symmetric authentication authentication

Computer Science & Information Technology

To search for a specific record click the _____ button on the Home tab shown in the accompanying figure to display the Find and Replace dialog box.

A. Search B. Filter C. Search and Edit D. Find

Computer Science & Information Technology

Which of the following can be used by employees to find information in various document repositories or to find mislaid documents?

a. A perceptive software pack b. A binary search tool c. An enterprise search software d. An enterprise outsourcing tool

Computer Science & Information Technology