To view a PDF file, you need to have ________ installed on your computer

A) Internet Explorer

B) Microsoft Office

C) Adobe Reader

D) OpenOffice


C

Computer Science & Information Technology

You might also like to view...

What are some of the most important Web server vulnerabilities?

What will be an ideal response?

Computer Science & Information Technology

Digital ____ authenticate the cryptographic key that is embedded in the certificate.

A. logs B. hashes C. certificates D. signatures

Computer Science & Information Technology

The ____ built-in function is used to convert a string literal to an integer.

A. toNum(string) B. parseInt(string) C. parseInteger(string) D. parse(string)

Computer Science & Information Technology

Any form of authentication that uniquely identifies you, such as your retinal patterns or fingerprints is called ____________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology