A(n) ________ is a collection of information stored on a computer under a single name

Fill in the blank(s) with correct word

file

Computer Science & Information Technology

You might also like to view...

Which is the strongest form of wireless security?

A. WEP B. IGP C. WPA2 D. RADIUS

Computer Science & Information Technology

In order to use modifier keys, you should:

a) use the ModifierKey event. b) use the KeyData property. c) use the ModifierKeyHandler. d) modifier keys are handled by the operating system.

Computer Science & Information Technology