Until a document is saved to a hard drive or USB flash drive it is stored in ________

A) the Clipboard B) RAM C) the gallery D) ROM

B

Computer Science & Information Technology

You might also like to view...

Which of the following protocols is used primarily for monitoring and managing network devices?

A. SNMP B. SMTP C. FTPS D. NTP

Computer Science & Information Technology

_________ is a tool used to automatically identify potentially vulnerable programs.

A. Slamming B. Sledding C. Fuzzing D. All the above

Computer Science & Information Technology