Using an application's _____ settings, you can select how you want to handle updates.

A. Preferences
B. Download
C. Update
D. Upgrade


Answer: A

Computer Science & Information Technology

You might also like to view...

The term network ________ refers to the design of a network

Fill in the blank(s) with correct word

Computer Science & Information Technology

Port scanning is a sophisticated technique of authenticating one machine to another by forging packets from a trusted source

a. true b. false

Computer Science & Information Technology

Using an array of structures to insert and delete ordered structures is an efficient use of memory.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The core services provided by PKI are ____, integrity and confidentiality.

A. authentication B. authorization C. availability D. nonrepudiation

Computer Science & Information Technology