Which of the following is NOT a file type?

A. application
B. executable
C. system
D. tile

Answer: D

Computer Science & Information Technology

You might also like to view...

Because macros and modules are difficult to initiate, business managers should not use them with Access

Indicate whether the statement is true or false

Computer Science & Information Technology

Chinese hackers whose stated goal is to infiltrate Western computer systems are called the ___________

a. Eastern Alliance b. China Eagle Union c. Shanghai Express d. None of the above

Computer Science & Information Technology