Files may be characterized by attributes such as ________.

a) size
b) priority
c) activity
d) both a and c

d) both a and c

Computer Science & Information Technology

You might also like to view...

Which of the following best describes an assessment?

A. Evidenced-based examination that compares current practices against a specific internal or external criteria B. A focused privileged inspection to determine condition, locate weakness or vulnerabilities, and identity corrective actions C. Testing controls by performing vulnerability assessment tests that simulate real attacks D. Configuring the System and Security logs on each system to record and audit activities

Computer Science & Information Technology

If a single space is not enough and you want more space between characters or words, which two special characters can you use?

What will be an ideal response?

Computer Science & Information Technology