As shown in the accompanying figure, if you point to a command on a menu that has an arrow to its right edge, a(n) ____ displays another list of commands.
a. ellipsis
b. index
c. dock
d. submenu
d. submenu
Computer Science & Information Technology
You might also like to view...
The practice of writing a method to perform a single task and then calling that method whenever you need to perform that task is called:
a. Code reuse b. Divide and conquer c. Inheritance d. Parameter e. None of these
Computer Science & Information Technology
Which of the following would be considered a vulnerability?
A. installation of a firewall B. antivirus software C. Internet-connected computer D. spyware
Computer Science & Information Technology
Create a method that draws an X across the current picture using dashed lines.
What will be an ideal response?
Computer Science & Information Technology
The first phase in the development of the contingency planning process is the ____.
A. crisis plan B. disaster recovery plan C. incident response plan D. business impact analysis
Computer Science & Information Technology