Which of the following is a valid folder name?

A. PRN
B. COM
C. NUL
D. LPT3


Answer: B

Computer Science & Information Technology

You might also like to view...

What would you use to mark the description in a description list?

a. dl b. dt c. dd d. li e. None of the above.

Computer Science & Information Technology

The escape sequence \r moves the insertion point to the beginning of the next line.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which of the follwoing network devices allows a remote device to obtain Ethernet data as well as electrical power?

a. PD b. PoE injector c. Repeater d. Router

Computer Science & Information Technology

In ____ cryptography, the same key is used for both encryption and decryption.

A. secret key B. public key C. open key D. limited key

Computer Science & Information Technology