Which of the following is NOT a file type?
A. application
B. executable
C. system
D. tile
Answer: D
Computer Science & Information Technology
You might also like to view...
Because macros and modules are difficult to initiate, business managers should not use them with Access
Indicate whether the statement is true or false
Computer Science & Information Technology
Chinese hackers whose stated goal is to infiltrate Western computer systems are called the ___________
a. Eastern Alliance b. China Eagle Union c. Shanghai Express d. None of the above
Computer Science & Information Technology