There are ____ classifications of fonts.

A. two
B. three
C. four
D. six


Answer: A

Computer Science & Information Technology

You might also like to view...

Which of the following is a reason security professionals might use a packet sniffer?

A) To plan a DoS attack B) To capture usernames and passwords C) To check if the encryption used is strong enough D) To capture sensitive documents

Computer Science & Information Technology

Convert the decimal number to binary number.

Convert ![15102|31x24](upload://z7kTORHvivfqvTSqBpKfOIv0HMJ.png)

Computer Science & Information Technology

When a form is used to input or modify data in a table, the data is saved to the table ________

A) automatically B) only when the user saves the form C) only when the user saves a record D) only when the user saves the table

Computer Science & Information Technology

HIPAA enables access to PHI on a ____________ basis

a. Need-to-know b. Doctor-only c. Hospital staff-only d. None of the above

Computer Science & Information Technology