If your system is frozen or stuck, ________
A) check the Task Manager B) run troubleshooters
C) reboot the system D) check the connections
C
You might also like to view...
After you have completed essential steps following a security breach and have notified the appropriate people, what should be the final step?
A) Copy the logs of all affected systems for use as evidence. B) Perform an emergency audit to determine whatdamage has been done. C) Meet with IT staff to discuss what can be learned and how to prevent it from happening again. D) Change all affected passwords and repair any damage that has been done.
Match the following terms to their meanings:
I. HTML II. Webpage III. Tag IV. XML V. XML schema A. Text files that contain text and codes that a web browser interprets as the page is loaded B. If you need to display an Access object on a webpage, export the object to this format C. Language recognized by many programs that allows you to create your own set of tags D. Begins with the character < and ends with the character > E. It defines the tag names, order, relationships, and data type and is essential to ensure that all of the table relationships and data types are preserved when the data is imported into another database
Windows 10 lets you search for an app by clicking the Start button and then typing part of its name. _________________________
Answer the following statement true (T) or false (F)
What is the term for a program that performs a repetitive task on a network?
A. zombie B. rootkit C. bot D. Trojan horse