To align two or more selected controls along their left, right, top, or bottom borders, you would use the ____ menu.

A. Edit
B. Format
C. Align
D. View


Answer: B

Computer Science & Information Technology

You might also like to view...

The identification of vulnerabilities is usually done through ____ tests.

A. network B. application C. penetration D. protocol

Computer Science & Information Technology

Discuss permissive versus restrictive firewall policies.

What will be an ideal response?

Computer Science & Information Technology

You should always make sure that your profile is complete and up to date

Indicate whether the statement is true or false

Computer Science & Information Technology

The Linux operating system comes with a native cryptography system installed.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology