To access programs on your computer that are not listed on the Start menu, you need to use the ________ button

A) Other Software
B) Other Programs
C) All Software
D) All Programs


D

Computer Science & Information Technology

You might also like to view...

Use ____ backgrounds sparingly — they are most effective for starkness and special effects.

a. multicolored b. gray c. black d. white

Computer Science & Information Technology

Which of the following is NOT a Remote Desktop role service?

A. RD connection broker B. RD integrated hypervisor C. RD session host D. RD Web access

Computer Science & Information Technology

The file format ________, recognized by PowerPoint, is a format that can be transferred among platforms and can be used to transfer formatted text documents among applications

A) .docx B) .txt C) .doc D) .rtf

Computer Science & Information Technology

You have been asked to revise the current security awareness and training program based on recent attacks that have occurred. One of the attacks occurred when a workstation's pointer operated on its own to move and open file. You need to address this attack in the revised program and provide procedures that users must follow. Which of the following should you instruct users to do if this attack

occurs? A. Unplug the network cable. B. Reboot the workstation. C. Take a screen shot and email it to the IT department. D. Contact the incident response team for direction.

Computer Science & Information Technology