When objects are locked, they cannot be ____.

A. selected
B. moved
C. edited
D. all of the above


Answer: D

Computer Science & Information Technology

You might also like to view...

Which is not a quantitative document available for interpretation in any business?

A) records B) reports used for decision making C) performance reports D) data capture records

Computer Science & Information Technology

A _____ is a security weakness or soft spot.

A. proxy B. vulnerability C. firewall D. malware

Computer Science & Information Technology

Upon encountering the command line pgm14.3 three blind mice, the operating system stores it as a sequence of ____ strings.

A. one B. three C. four D. five

Computer Science & Information Technology

Which of the following is commonly used to test fiber connectivity?

A. OTDR B. Toner probe C. Butt set D. Multimeter

Computer Science & Information Technology