A ________ features a line at the top and bottom of the primary characters

A) proportional typeface B) sans serif typeface
C) monospaced typeface D) serif typeface


D

Computer Science & Information Technology

You might also like to view...

In a discretionary access control model, who is in charge of setting permissions to a resource?

A. Owner of the resource B. Administrator C. Any user of the computer D. Administrator and the owner

Computer Science & Information Technology

A(n) ____________________-party cookie is a cookie that was not created by the Web site that attempts to access the cookie.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Some Internet Service Providers (ISPs) offer Internet search capabilities as part of their service

Indicate whether the statement is true or false

Computer Science & Information Technology

A security breach has been discovered. You have identified the attack and preserved the affected systems and devices. What is the next step in this investigation?

A. Preservation B. Collection C. Examination D. Identification

Computer Science & Information Technology