Text or graphics that appear behind the text on a document are called ________

A) fills B) backgrounds C) watermarks D) stencils


C

Computer Science & Information Technology

You might also like to view...

The process used to bring a copy of data from one source or application into another application

a. Design b. Import c. Transfer

Computer Science & Information Technology

You can accept changes in a document one by one or you can accept all changes at one time

Indicate whether the statement is true or false

Computer Science & Information Technology

Fields included in a query may be modified after the query is saved. ____________________

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

This data encryption standard is the weakest of the wireless encryption standards, with many problems, including encryption that is easy to break; it only encrypts the Data Link and Physical layers, the key is static and shared, and there is no mechanism for performing user authentication.

A. Wired Equivalent Privacy (WEP) B. Mac address filtering C. Wi-Fi Protected Access (WPA) D. Wi-Fi Protected Access 2 (WPA2)

Computer Science & Information Technology