When objects are locked, they cannot be ____.
A. selected
B. moved
C. edited
D. all of the above
Answer: D
Computer Science & Information Technology
You might also like to view...
Which is not a quantitative document available for interpretation in any business?
A) records B) reports used for decision making C) performance reports D) data capture records
Computer Science & Information Technology
A _____ is a security weakness or soft spot.
A. proxy B. vulnerability C. firewall D. malware
Computer Science & Information Technology
Upon encountering the command line pgm14.3 three blind mice, the operating system stores it as a sequence of ____ strings.
A. one B. three C. four D. five
Computer Science & Information Technology
Which of the following is commonly used to test fiber connectivity?
A. OTDR B. Toner probe C. Butt set D. Multimeter
Computer Science & Information Technology