You would use a(n) ________ to display information at the bottom of each page
A) footer B) endnote C) annotation D) footnote
A
Computer Science & Information Technology
You might also like to view...
Both Windows and UNIX-based systems use a central configuration file, called ____, to configure MySQL on startup.
A. my.uni B. my.cnf C. my.sql D. my.str
Computer Science & Information Technology
Which two security measures would be best if a technician is implementing a Wi-Fi hotspot for customers or visitors? (Select two.)
A) WPA2 B) WEP C) TKIP D) Static IP addressing E) AES
Computer Science & Information Technology
How can an application alert stakeholders of invasion?
A. cancel the user's password B. send out SMS messages C. log the activity in a log file D. catch all errors
Computer Science & Information Technology
In response to the demand for two-pair cabling, manufacturers often connect two fibers together to create __________ fiber-optic cabling.
A. RG-8 B. duplex C. modal D. single-mode
Computer Science & Information Technology