By creating an MS-DOS __________, a user can specify a series of commands to be carried out in a fixed order.
a. batch file
b. boot routine
c. filter
d. job stream
a. batch file
Computer Science & Information Technology
You might also like to view...
Jim wants to allow a partner organization's Active Directory forest (B) to access his domain forest's (A)'s resources but doesn't want to allow users in his domain to access B's resources. He also does not want the trust to flow upward through the domain tree as it is formed. What should he do?
A. Set up a two-way transitive trust. B. Set up a one-way transitive trust. C. Set up a one-way nontransitive trust. D. Set up a two-way nontransitive trust.
Computer Science & Information Technology
How is an incident response strategy triggered?
A. By displaying a user warning B. By recording the baseline C. By defining a clipping level D. By an event
Computer Science & Information Technology