E-mail attachments with the extension _____ are especially vulnerable to being blocked.

A. .doc
B. .exe
C. .txt
D. .jpg


Answer: B

Computer Science & Information Technology

You might also like to view...

A(n) __________________ graph is a graph with a high number of edges.

A. dense B. TS C. cyclic D. sparse

Computer Science & Information Technology

The ________ tool changes the color of lines and borders of an object.

(a) paint bucket (b) ink bottle (c) line (d) brush

Computer Science & Information Technology

What file transfer protocol uses UDP port 69, and does not use user names and passwords?

A. FTP B. Web browsing C. e-mail D. TFTP

Computer Science & Information Technology

When using the file transfer protocol in active mode, which of the following ports is used to transfer a file?

A. 20 B. 23 C. 25 D. 115

Computer Science & Information Technology