24 % 5 is _____

a. 1
b. 2
c. 3
d. 4
e. 0

d

Computer Science & Information Technology

You might also like to view...

iOS refers to

A) An integrated operating system B) An Internet operating system that allows modifications C) A closed source or vendor-specific operating system D) A type of operating system that does allow modifications

Computer Science & Information Technology

What security control may be used to implement a concept known as two-person control?

A. Mandatory vacation B. Separation of duties C. Least privilege D. Defense in depth

Computer Science & Information Technology