A(n) _______________ installation is performed when scripts are used to automatically select options and components, i.e., to configure the installation, without any user intervention.

Fill in the blank(s) with the appropriate word(s).


unattended

correct

Computer Science & Information Technology

You might also like to view...

The number of times that a method calls itself is known as the ___________________ of recursion.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

You can click the Header & Footer button in the ____________________ group on the Insert tab to open the Header and Footer dialog box.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Exploits that use malicious SQL statements to gain unauthorized access to a database are called SQL _____________.?

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Which of the following statements about background images is false?

A. Background images can be used to take the place of background colors. B. You should avoid using background images if they make the text difficult to read. C. You should use a background image and a background color on the same page in order to increase contrast. D. You can choose a single image or a tiles image for the background.

Computer Science & Information Technology