When a CheckBox is selected, a black ________ appears in the CheckBox.

a) check mark
b) dot
c) x
d) slash


a) check mark

Computer Science & Information Technology

You might also like to view...

The AES cipher begins and ends with a(n) _________ stage because any other stage, applied at the beginning or end, is reversible without knowledge of the key and would add no security.

A. Substitute bytes B. AddRoundKey C. MixColumns D. ShiftRows

Computer Science & Information Technology

The ___________ functions as an access control point for users in remote locations connecting to an enterprise’s internal network.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Rows in worksheets are identified by a row letter

Indicate whether the statement is true or false

Computer Science & Information Technology

Hardware components that cannot operate together in the same PC are called ____.

A. inoperable B. incompatible C. incongruous D. inconsistent

Computer Science & Information Technology