A(n) ____ can be used to provide a reminder to the user.

A. clone
B. watermark
C. formatted shape
D. indexed transparency


Answer: B

Computer Science & Information Technology

You might also like to view...

A(n) _____ is anything you use to research your topic, including books, magazines, Web sites, and movies.?

A. ?footnote B. ?source C. ?object D. ?copyright

Computer Science & Information Technology

When viewing a syslog message, what does a level of 0 indicate?

a. The message is an error condition on the system. b. The message is a warning condition on the system. c. The message is an emergency situation on the system. d. The message represents debug information.

Computer Science & Information Technology

An attacker types more data in a field than the programmer expected. This is a(n) ________ attack

A.buffer overflow B. denial-of-service C. directory traversal D. XSS

Computer Science & Information Technology

Which option below is not one of the recommended practices for maintaining a keyed padlock?

A. ?Appoint a key custodian. B. Take inventory of all keys when the custodian changes. C. ?Use a master key. D. ?Change locks and keys annually.

Computer Science & Information Technology