____ is another term for document properties.

A. Metadata
B. Key terms
C. Enhanced text
D. Indices


Answer: A

Computer Science & Information Technology

You might also like to view...

All import declarations must be placed

a. inside the class declaration’s body. b. before the class declaration. c. after the class declaration. d. all of the above will work.

Computer Science & Information Technology

Executable profiling and threshold monitoring are examples of which of the following?

A) Preemptive blocking B) Infiltration C) Anomaly detection D) Sniffing

Computer Science & Information Technology

Suppose that a pointer called start points to the first node in a linked list, and each node is made from a Node struct having an info data member and a next data member. To access info in the first node, we can use the code:

A. ptr->info B. ptr = ptr->info; C. info->start D. start->info

Computer Science & Information Technology

The __________ risk treatment strategy attempts to shift the risk to other assets, processes, or organizations.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology