Match each of the following Microsoft programs to its description:

I. syntax
II. browsing history
III. Temporary Internet files
IV. cookie
V. InPrivate Browsing

A. copies of webpages, images, and media that have been downloaded from the Web
B. information about your surfing stored by a browser as you browse the Web
C. arrangement of keywords in a search expression
D. small text file that a website puts on your computer to store information about you and your preferences
E. Microsoft Edge feature that prevents anyone else who might be using your computer from seeing what sites you visited

C, B, A, D, E

Computer Science & Information Technology

You might also like to view...

Match each of the following networks to its definition:

I. WAN II. LAN III. MAN IV. PAN V. HAN A. links users in a specific geographic area (usually a city) B. network of two or more LANs C. a network in a small geographic area D. can be used for a small home-based business E. used by a single individual connecting devices using wireless media

Computer Science & Information Technology

Row-level locking is used to ensure that, when two users are editing a table, they cannot edit the same row, record, of data. This is not compatible in a(n) ________ database

A) encrypted B) decrypted C) secured D) shared

Computer Science & Information Technology