File ____ describe(s) file characteristics such as name, type, location, and size.

A. Explorer
B. names
C. properties
D. extensions

Answer: C

Computer Science & Information Technology

You might also like to view...

The ____ technique tries all combinations of letters, numbers, and symbols until eventually landing on the correct password.

A. dictionary B. brute force C. computed hash D. linear hash

Computer Science & Information Technology

What are some issues that can be prevented by software security?

What will be an ideal response?

Computer Science & Information Technology