You would use a(n) ________ to display information at the bottom of each page

A) footer B) endnote C) annotation D) footnote


A

Computer Science & Information Technology

You might also like to view...

Both Windows and UNIX-based systems use a central configuration file, called ____, to configure MySQL on startup.

A. my.uni B. my.cnf C. my.sql D. my.str

Computer Science & Information Technology

Which two security measures would be best if a technician is implementing a Wi-Fi hotspot for customers or visitors? (Select two.)

A) WPA2 B) WEP C) TKIP D) Static IP addressing E) AES

Computer Science & Information Technology

How can an application alert stakeholders of invasion?

A. cancel the user's password B. send out SMS messages C. log the activity in a log file D. catch all errors

Computer Science & Information Technology

In response to the demand for two-pair cabling, manufacturers often connect two fibers together to create __________ fiber-optic cabling.

A. RG-8 B. duplex C. modal D. single-mode

Computer Science & Information Technology