You would insert a(n) ________ break to divide a document into separate parts
A) document
B) page
C) line
D) section
D
You might also like to view...
Threat assessment, security requirements, and secure architecture are security practices that are applied at what business function level of the SAMM?
Fill in the blank(s) with the appropriate word(s).
The ________ summarizes what has been discovered about the users, usability, and usefulness of current systems; provides cost-benefit analyses of alternatives; and makes recommendations on what (if anything) should be done.
A) systems proposal B) database design C) template D) development life cycle
As shown in the accompanying figure, Word shades a shaded area from the left margin to the right margin of the current paragraph.
Answer the following statement true (T) or false (F)
Like font styles, font effects are ____ commands-a font effect is either turned on or off.
A. toggle B. switch C. simple D. click