When a Read-only file is opened, the title bar will display [Read-only], indicating the file cannot be changed or ________

A) deleted B) moved C) saved D) edited


C

Computer Science & Information Technology

You might also like to view...

Unauthorized users can access the network using a number of well-known techniques, such as_______—a method in which an attacker simulates the IP of an authorized user or host to get access to resources that would otherwise be off-limits.

a) IP stealing. b) IP simulating. c) IP spoofing. d) None of the above.

Computer Science & Information Technology

Which statement assigns today's date to the Date variable currently?

(A) currently = #Now# (B) currently = #Today# (C) currently = Now (D) currently = Today

Computer Science & Information Technology

The iframe element is more commonly used on the Web; but if you are writing code in compliance with the strict application of XHTML, the ____ element should be used.

A. img B. src C. applet D. object

Computer Science & Information Technology

The key of the right child below the root node of a search binary tree is 40. The value in the root node could be ____.

A. 30 B. 40 C. 50 D. 60

Computer Science & Information Technology