The color scheme most normally associated with danger or poison is ____________.

a. black and yellow
b. black and gold
c. yellow and violet
d. black and blue


a. black and yellow

Computer Science & Information Technology

You might also like to view...

Two fields needed to uniquely identify a record are called a ________ key

A) composite B) natural primary C) foreign D) primary

Computer Science & Information Technology

Precede a member with its ________ name and the scope resolution operator _________ if the possibility exists of a scoping conflict.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A(n) ________ is a small web browser window that displays on top of the website you are viewing, and is usually created by advertisers

A) cookie B) plug-in C) pop-up D) add-on

Computer Science & Information Technology

In the TCP/IP model, which layer defines the interface between software running on the computer and the network itself?

A) Transport B) Internet C) Application D) Data link

Computer Science & Information Technology