Text or graphics that appear behind the text on a document are called ________
A) fills B) backgrounds C) watermarks D) stencils
C
You might also like to view...
The process used to bring a copy of data from one source or application into another application
a. Design b. Import c. Transfer
You can accept changes in a document one by one or you can accept all changes at one time
Indicate whether the statement is true or false
Fields included in a query may be modified after the query is saved. ____________________
Answer the following statement true (T) or false (F)
This data encryption standard is the weakest of the wireless encryption standards, with many problems, including encryption that is easy to break; it only encrypts the Data Link and Physical layers, the key is static and shared, and there is no mechanism for performing user authentication.
A. Wired Equivalent Privacy (WEP) B. Mac address filtering C. Wi-Fi Protected Access (WPA) D. Wi-Fi Protected Access 2 (WPA2)