All of the following steps must be taken when a file is used by an application except ______.
a. the file must be opened. If the file does not exist, the file will be created.
b. the file must have a fully qualified path when opening the file.
c. data is either written to the file or read from the file.
d. when the application is finished using the file, the file is closed.
b. the file must have a fully qualified path when opening the file.
You might also like to view...
The ________ data type is the preferred type for storing pictures, Office files, and small executable files
A) Hyperlink B) Object C) Memo D) Attachment
What are the subnet network and the broadcast network for the IP address 192.168.47.246/27?
A) 192.168.47.247 B) 192.168.47.224 C) 192.168.47.255 D) 192.168.47.128
Although the Cyberterrorism Preparedness Act of 2002 was not passed, many of its goals were addressed by the ___________
a. CIA b. Pentagon c. Patriot Act d. None of the above
List and describe the different types of hardening.
What will be an ideal response?