By creating a __________, a user can cause a series of command language commands to be executed in sequence.

a. batch file
b. command file
c. primitive file
d. source file


a. batch file

Computer Science & Information Technology

You might also like to view...

Given a directed graph with negative edge weights, Dijkstra's algorithm is capable of finding the shortest path between two nodes.

a. True b. False

Computer Science & Information Technology

Procfs is a file system ________.

a) can be accessed only by a user with root privileges b) that exists only in main memory c) contains VFS directory entries d) that is read-only

Computer Science & Information Technology

You can set security restriction policies to specify rules that govern exceptions to the security level you specified, and the rule that identifies software according to an Internet Explorer network zone, including the Internet, Local Intranet, Trusted sites, and Restricted sites zones is the New _________Rule

a. Certificate b. Hash c. Network Zone d. Path

Computer Science & Information Technology

Another name for an input form is a source document.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology