Match the following extensions with the appropriate file type

I. rft
II. mp3
III. wmv
IV. zip
V. bmp

A. Audio file
B. Rich Text Format
C. Compressed file or folder
D. Video file
E. Image file

B, A, D, C, E

Computer Science & Information Technology

You might also like to view...

Compare and contrast the private visibility modifier to the protected visibility modifier. Why is the protected visibility modifier a better choice in an inheritance hierarchy?

What will be an ideal response?

Computer Science & Information Technology

Which of the following web application security weaknesses can be mitigated by preventing the use of HTML tags?

A. LDAP injection B. SQL injection C. Error and exception handling D. Cross-site scripting

Computer Science & Information Technology