Which of the following is not a forbidden character for filenames of web pages?

A. *
B. &
C. ^
D. _


Answer: D

Computer Science & Information Technology

You might also like to view...

Which of the following viruses was designed to target computers running Windows in the energy sector?

A) Zafi.d B) Shamoon C) Mirai D) Game over ZeuS

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

1) An atomic operation executes without interruption and without interference. 2)Deadlock avoidance is more restrictive than deadlock prevention. 3) The dining philosophers’ problem can be representative of problems dealing with the coordination of shared resources which may occur when an application includes concurrent threads of execution. 4) A signal is similar to a hardware interrupt but does not employ priorities. 5) A mutex is used to ensure that only one thread at a time can access the resource protected by the mutex.

Computer Science & Information Technology

An attacker went to a local bank and collected disposed paper for the purpose of collecting data that could be used to steal funds and information from the bank's customers. This is an example of:

A. Impersonation B. Whaling C. Dumpster diving D. Hoaxes

Computer Science & Information Technology

To simultaneously retrieve values from two different arrays, you should use a for loop with subscript indices.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology