There are ____ classifications of fonts.
A. two
B. three
C. four
D. six
Answer: A
Computer Science & Information Technology
You might also like to view...
Which of the following is a reason security professionals might use a packet sniffer?
A) To plan a DoS attack B) To capture usernames and passwords C) To check if the encryption used is strong enough D) To capture sensitive documents
Computer Science & Information Technology
Convert the decimal number to binary number.
Convert 
Computer Science & Information Technology
When a form is used to input or modify data in a table, the data is saved to the table ________
A) automatically B) only when the user saves the form C) only when the user saves a record D) only when the user saves the table
Computer Science & Information Technology
HIPAA enables access to PHI on a ____________ basis
a. Need-to-know b. Doctor-only c. Hospital staff-only d. None of the above
Computer Science & Information Technology