.cst files that are locked for distribution have the ____ file extension.
A. .cxt
B. .dir
C. .dcr
D. .dxr
Answer: A
Computer Science & Information Technology
You might also like to view...
When a line of text contains a revision, a ________ displays in the left margin
A) balloon B) comment C) horizontal change bar D) vertical change bar
Computer Science & Information Technology
____________________, also known as "fuzzing," is a straight-forward technique that looks for vulnerabilities in a program or protocol by feeding random input into the program or the network running the protocol.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology