In the accompanying figure, item 6 indicates the ____.

A. template
B. frame
C. document window
D. preview


Answer: C

Computer Science & Information Technology

You might also like to view...

A thread gains access to a resource with a nonempty discretionary access control list (DACL) if ________.

a) the first ACE (access control entry) in the resource's DACL that matches one of the SIDs in the thread's access token grants that security principal access to the resource b) no ACE in the resource's DACL denies access to any of the SIDs in the thread's access token c) one of the ACEs in the resource's DACL that matches one of the SIDs in the thread's access token grants that security principal access to the resource d) for each SID in the thread's access token, there is an ACE in the resource's DACL that grants access to the resource

Computer Science & Information Technology

________ is the process of breaking down information sent or transmitted across the Internet into small parts.

A. Protocol B. Identification C. Packetization D. Bandwidth

Computer Science & Information Technology

____ is the practice of using Internet-connected resources to perform processing, storage, or other operations.

A. Cloud computing B. Command line interfacing C. Process management D. Network management

Computer Science & Information Technology

COGNITIVE ASSESSMENT You are in charge of an event at work. You want to plan and schedule events and resources. What type of software should you use?

A. project management B. calendar C. database D. software suite

Computer Science & Information Technology