File ____ describe(s) file characteristics such as name, type, location, and size.
A. Explorer
B. names
C. properties
D. extensions
Answer: C
Computer Science & Information Technology
You might also like to view...
The ____ technique tries all combinations of letters, numbers, and symbols until eventually landing on the correct password.
A. dictionary B. brute force C. computed hash D. linear hash
Computer Science & Information Technology
What are some issues that can be prevented by software security?
What will be an ideal response?
Computer Science & Information Technology