Different levels in a document are visible in ________ view
A) Layout
B) Design
C) Master
D) Outline
D
You might also like to view...
An intrusion is any access to data or programs by hackers, criminals, or other unauthorized persons.
Answer the following statement true (T) or false (F)
A specialty search engine is a(n) ________
A) launch style search engine B) search engine that searches only sites that are relevant to a particular topic C) spider program which collects hits over time D) internal website search
If you do not specify a destination directory when running TFTP, you will overwrite your own /etc/passwd file
Indicate whether the statement is true or false.
Which is a useful approach when a customer cannot define requirements clearly?
A. The prototyping model of software development B. The waterfall model of software development C. The spiral model of software development D. The incremental model of software development