Your ________ includes all the information that someone could find out about you by searching the web, including social network sites.

a. digital footprint
b. alias
c. avatar


a. digital footprint

Computer Science & Information Technology

You might also like to view...

Suppose that a dirty page in the cache has been written by two active transactions and that one of the transactions commits. Describe howthe caching procedure works in this case.

What will be an ideal response?

Computer Science & Information Technology

Once a navigation form has been created, additional forms and reports can be ________

A) rearranged on the form, but not added to the form or deleted from to the form B) added to the form, but cannot rearranged or deleted from the form C) added to the form, deleted from the form, or rearranged on the form D) added to or deleted from the form, but not rearranged on the form

Computer Science & Information Technology

After text is selected, a(n) ________ appears containing buttons for the most commonly used formatting commands

A) Mini toolbar B) contextual tab C) toggle button D) Answer Choice

Computer Science & Information Technology

Text in a table is usually aligned ________

Fill in the blank(s) with correct word

Computer Science & Information Technology