For command-line tools, type ____________________ followed by a command to see the available switches for that command.
Fill in the blank(s) with the appropriate word(s).
help
You might also like to view...
While __________ is centered on creating procedures, __________ is centered on creating objects.
a. procedural programming, object-oriented programming b. object-oriented programming, procedural programming c. routine programming, method programming d. procedural programming, class programming
Match each of the following terms about files to its meaning:
I. fragmented II. restored III. temporary Internet file IV. temporary Windows file V. unmovable A. file with data in scattered blocks or clusters B. file that is ignored by Disk Defragmenter C. file that is undeleted D. file created by surfing websites E. file created from unexpected program crashes
An external file that contains JavaScript functions has an extension of ________
Fill in the blank(s) with correct word
Almost all TCP/IP applications have moved to __________ for symmetric cryptography.
A. Rivest Cipher 4 (RC4) B. Data Encryption Standard (DES) C. Advanced Encryption Standard (AES) D. Rivest Shamir Aleman (RSA)