A combination of keys that perform a command, such as Ctrl + I, is called a keyboard ________
A) rule
B) shortcut
C) function
D) task
B
Computer Science & Information Technology
You might also like to view...
Which of the following is the proper way to quantify the total monetary damage resulting from an exploited vulnerability?
A. Calculate the ALE B. Calculate the ARO C. Calculate the MTBF D. Calculate the TCO
Computer Science & Information Technology
A security administrator needs to implement a system that detects possible intrusions based upon a vendor provided list.Which of the following BEST describes this type of IDS?
A. Signature based B. Heuristic C. Anomaly-based D. Behavior-based
Computer Science & Information Technology