Until a document is saved to a hard drive or USB flash drive it is stored in ________
A) the Clipboard B) RAM C) the gallery D) ROM
B
Computer Science & Information Technology
You might also like to view...
Which of the following protocols is used primarily for monitoring and managing network devices?
A. SNMP B. SMTP C. FTPS D. NTP
Computer Science & Information Technology
_________ is a tool used to automatically identify potentially vulnerable programs.
A. Slamming B. Sledding C. Fuzzing D. All the above
Computer Science & Information Technology