XPS is considered an alternative to what file format?

A) TXT B) DOCX C) PDF D) RTF


C

Computer Science & Information Technology

You might also like to view...

In the case of every one of the EBK security functions, the ____ stage creates a framework of concrete security procedures and practices, which then serve as the basis for executing the process in the real world.

A. plan B. execute C. design D. review

Computer Science & Information Technology

Which components must match? (Select all that apply.)

A) CPU to processor socket B) CPU to type of video port C) Motherboard to processor D) Chipset to maximum number of USB ports E) Chipset to motherboard F) BIOS to keyboard type

Computer Science & Information Technology

A(n) ____________________ printer is one you and other network users all use.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

In process-based DO/S, resources are controlled by servers called ____ that are responsible for accepting requests for service on the individual devices they control, processing each request fairly, providing service to the requestor, and returning to serve others.

A. kernels B. guardians C. spoolers D. nodes

Computer Science & Information Technology