A _____ is the line that defines the perimeter of a table.

A. ?table ruler
B. ?table border
C. ?table mark
D. ?table frame


Answer: B

Computer Science & Information Technology

You might also like to view...

Which of the following is correct when labeling cases in a switch structure?

a. case1: b. Case1: c. case 1: d. Case 1:

Computer Science & Information Technology

Write a method to rotate a picture to the right by 180 degrees.

What will be an ideal response?

Computer Science & Information Technology

Write a program that reads the CSV file and calculates the average number of positive axillary nodes detected for patients that survived 5 years or longer, and the average number of positive axillary nodes detected for patients that died within 5 years. A significant difference between the two averages suggests whether or not the number of positive axillary nodes detected can be used to predict survival time. Your program should ignore the age and year fields for each record.

The UC Irvine Machine Learning repository contains many datasets for conducting computer science research. One dataset is the Haberman’s Survival dataset, available at http://archive.ics.uci.edu/ml/datasets/Haberman's+Survival and also included online with the source code for the book. The file “haberman.data” contains survival data for breast cancer patients in comma-separated value format. The first field is the patient’s age at the time of surgery, the second field is the year of the surgery, the third field is the number of positive axillary nodes detected, and the fourth field is the survival status. The survival status is 1 if the patient survived 5 years or longer and 2 if the patient died within 5 years. The case study in Listing 10.4 shows how to process a CSV file and makes a good starting point for this project.

Computer Science & Information Technology

A mobile device user has entered her user ID and password to access an online account. The user immediately receives a text message with a unique PIN that must be entered before she is granted access to the account.    Which of the following describes the security method being used?

A. Multifactor authentication B. Full device encryption C. Biometric authentication D. Fingerprint unlock

Computer Science & Information Technology