Which of the following is a valid folder name?
A. PRN
B. COM
C. NUL
D. LPT3
Answer: B
Computer Science & Information Technology
You might also like to view...
What would you use to mark the description in a description list?
a. dl b. dt c. dd d. li e. None of the above.
Computer Science & Information Technology
The escape sequence \r moves the insertion point to the beginning of the next line.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
Which of the follwoing network devices allows a remote device to obtain Ethernet data as well as electrical power?
a. PD b. PoE injector c. Repeater d. Router
Computer Science & Information Technology
In ____ cryptography, the same key is used for both encryption and decryption.
A. secret key B. public key C. open key D. limited key
Computer Science & Information Technology