If you purchase software in a box, it is likely distributed on which type of storage media?

A) DVD B) CD-ROM C) Blu-ray D) Floppy disk

B

Computer Science & Information Technology

You might also like to view...

The ________ function is used to join the text from two or more cells into one cell

A) CONCATENATE B) PASTE C) PROPER D) TEXT

Computer Science & Information Technology

An attacker is experimenting with an application by inserting long strings of machine language code in the application’s input fields. The attacker is attempting:

a. A denial-of-service attack b. A buffer overflow attack c. A stack smashing attack d. Any of the above

Computer Science & Information Technology