The composition of a Process Identifier can best be described as which one of the following?

A) Unique letter B) Random letter
C) Unique number D) Alpha-numeric code

C

Computer Science & Information Technology

You might also like to view...

Which of the following is not true about Internet fraud?

A) Internet fraud accounts for over 90% of all consumer-fraud complaints to the Federal Trade Commission. B) One example is the Nigerian letter scam where you receive an e-mail from someone claiming to have a large amount of money that needs to be released from an account if you can send money to help transfer the money. C) Other types of Internet security threats include phishing, pharming, and Trojan horses. D) Spam that promotes a product or cause is illegal, as well as a nuisance.

Computer Science & Information Technology

(___) ___-____ is an example of a(n) ________

A) lookup field B) data validation rule C) input mask D) default value

Computer Science & Information Technology