Match each action with its correct instruction.

A. To select files listed sequentially in a folder window.
B. To select files not listed sequentially in a folder window.
C. To select all files in a folder window.
D. To clear one file in a group of selected files.
E. To clear all files in a group of selected files.


A. Click the first item, hold down the SHIFT key, click the last item, and then release the SHIFT key.
B. Press and hold the CTRL key, click each item you want to select, and then release the CTRL key.
C. Click the Select all button in the Select group on the Home tab or press the CTRL+A keys.
D. Press and hold the CTRL key, click each file you want to remove from the selection, and then release the CTRL key.
E. Click a blank area of the folder window.

Computer Science & Information Technology

You might also like to view...

Each class you create becomes a new ________ that can be used to declare variables and create objects.

a. package b. instance c. library d. type.

Computer Science & Information Technology

Which of the following statements is false?

a. Tuples are immutable. b. Tuples must store heterogeneous data. c. A tuple’s length is its number of elements. d. A tuple’s length cannot change during program execution.

Computer Science & Information Technology

Match each item with a statement below.

A. Indicates the end of the condition being tested. B. Indicates the end of the code to be repeated. C. A loop statement that specifies the number of times to execute the portion of code. D. A loop statement that causes the interpreter to continue executing the code in the until loop portion of the script as long as the condition is false. E. Starts the condition being tested. F. A loop statement that tests a condition in much the same way as if-then statements. G. Starts the portion of code specifying what to do if the condition evaluates to false. H. Indicates the beginning of the code to be repeated. I. Starts the portion of code specifying what to do if the condition evaluates to true.

Computer Science & Information Technology

A(n) ____ probe uses dedicated probes for scanning the RF for attacks.

A. integrated B. embedded C. internal D. overlay

Computer Science & Information Technology