E-mail attachments with the extension _____ are especially vulnerable to being blocked.
A. .doc
B. .exe
C. .txt
D. .jpg
Answer: B
Computer Science & Information Technology
You might also like to view...
A(n) __________________ graph is a graph with a high number of edges.
A. dense B. TS C. cyclic D. sparse
Computer Science & Information Technology
The ________ tool changes the color of lines and borders of an object.
(a) paint bucket (b) ink bottle (c) line (d) brush
Computer Science & Information Technology
What file transfer protocol uses UDP port 69, and does not use user names and passwords?
A. FTP B. Web browsing C. e-mail D. TFTP
Computer Science & Information Technology
When using the file transfer protocol in active mode, which of the following ports is used to transfer a file?
A. 20 B. 23 C. 25 D. 115
Computer Science & Information Technology