A ________ is a visual representation of numerical data
A) chart
B) multilevel list
C) style
D) table
A
You might also like to view...
Two parties wish to exchange encrypted messages using symmetric key cryptography. The parties do not have an out-of-band method for exchanging keys. The parties should use:
a. A stream cipher b. Message digests c. Public key cryptography d. Diffie-Hellman key exchange
You must place text boxes in the top left of a slide.
Answer the following statement true (T) or false (F)
A row in a table can be selected:
A) ONLY by pointing to it with the mouse and clicking. B) by pressing the Select button on the Table Layout tab and choosing Select Row. C) by either pointing to it and clicking or choosing the Select button on the Table Layout tab and choosing Select Row. D) ONLY by choosing the Select button on the Page Layout tab.
A ____ contains a copy of the primary DNS server's zone database, but is not used for administration (is not authoritative).
A. child DNS server B. master DNS server C. replica DNS server D. secondary DNS server