Software falls into two main categories, system and ________
Fill in the blank(s) with correct word
application, applications
You might also like to view...
Which form documents the team's activities during evidence collection?
A. Scene Sketch form B. Field Activity Log form C. Photography Log form D. Field Evidence Log form
Aside from a live memory capture taken at the time of first response, what are two locations on a computer where copies of previous memory configurations can be found?
a. Cache b. Hybernation files c. The registry d. .DMP files
Which of the following is out of your control as a developer?
A. the size of embedded files B. the size of linked files C. the number of HTTP requests D. a user's Internet connection speed
What is the subnet mask for a Class C IP address?
A. 255.0.0.0 B. 255.255.0.0 C. 255.255.255.0 D. 255.255.255.255