A video card can deliver output to multiple ________

Fill in the blank(s) with correct word


monitors

Computer Science & Information Technology

You might also like to view...

Which statement is false?

a. The Collections API provides a set of public static methods for converting collections to unmodifiable versions. b. Unmodifable wrappers throw ModificationExceptions if attempts are made to modify the collection. c. You can use an unmodifiable wrapper to create a collection that offers read-only access to others while allowing read-write access to yourself. d. You can create the kind of collection mentioned in part (c) simply by giving others a reference to the unmodifiable wrapper while you also retain a reference to the wrapped collection itself.

Computer Science & Information Technology

Case 16-2 Since extensive data in the form of numbers can be difficult to assimilate, such data are better represented as charts. There are several types of charts available in Microsoft Excel. Choosing the right chart type to represent a data source is important to effectively illustrate data. A chart type should be chosen based on the number of data series, range of data series values, type of data series etc.? John, a senior scientist, is involved in a population study. He needs to create a graph based on the data he has collected for the population study. John's data source consists of a single data series whose values should be represented as relative to the whole. In this scenario, John should use a _____ to illustrate his data.

A. ?radar chart B. ?surface chart C. ?pie chart D. ?Venn chart

Computer Science & Information Technology

To insert a header, choose Header from the ____________________ tab, in the ____________________ group.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

What type of attack conducts a statistical analysis of the stolen passwords that is then used to create a mask to break the largest number of passwords?

A. character set attack B. binary attack C. mask attack D. rule attack

Computer Science & Information Technology