The ________ is an area reserved at the bottom of a document
Fill in the blank(s) with correct word
footer
You might also like to view...
A field that is also in another related table is called a ________ key
A) primary B) junction C) cascading D) foreign
A user is complaining that her mobile device is too dim to read when in a dimly lit room. Which of the following actions should you take first?
A. Remove the display protector. B. Replace the battery. C. Disable the auto-brightness option. D. Disable unused apps.
You are assisting a laptop user. While she was away from her desk, the laptop has powered off. The user was in the middle of working on a file and had forgotten to save changes. Can you reassure her that she has nothing to worry about?
A. Yes, you saw a remote assistance save her work for her B. No, tell her she will learn next time to leave her computer turned on an have her plan ahead. C. Yes, her computer was configured to hibernate and all her data will be intact D. No, because you hit the power down button for making you wait to long that her computer got bored and went to sleep
Match each item with a statement below:
A. freedom from danger B. allows a software program to run only with a matching external piece of information called a license C. involves making changes to the software program that prevent malicious users from accessing the internal state of the software, thereby making copying very difficult D. software attack that prohibits an opponent from using a program or an entire system E. the most widely recognized MLS model F. examines the problem of confining a software program during its execution so that it cannot transmit information to any other programs except its caller G. the standard for ranking product capabilities and trustworthiness H. the process of discovering all necessary requirements I. describe the different approaches that can be used to attack a system