To close a file but leave the application open, use the HOME tab to select the Close option.

Answer the following statement true (T) or false (F)


False

Computer Science & Information Technology

You might also like to view...

Which of the following is true about asymmetric cryptography?

A. the private key can be used to encrypt and decrypt a message B. a shared key is used to encrypt all messages and the private key decrypts them C. a single key is used and is transferred using a key management system D. the public key is used to encrypt a message sent to the private key owner

Computer Science & Information Technology

Get methods are commonly called ___________ or ___________ .

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

To determine a program’s ______________ requirements, you must determine the pieces of data required for the program to complete its task.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The _____ is the average value of a set of data items.

a) mean b) median c) mode d) matrix

Computer Science & Information Technology