You would insert a(n) ________ break to divide a document into separate parts

A) document
B) page
C) line
D) section


D

Computer Science & Information Technology

You might also like to view...

Threat assessment, security requirements, and secure architecture are security practices that are applied at what business function level of the SAMM?

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The ________ summarizes what has been discovered about the users, usability, and usefulness of current systems; provides cost-benefit analyses of alternatives; and makes recommendations on what (if anything) should be done.

A) systems proposal B) database design C) template D) development life cycle

Computer Science & Information Technology

As shown in the accompanying figure, Word shades a shaded area from the left margin to the right margin of the current paragraph.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Like font styles, font effects are ____ commands-a font effect is either turned on or off.

A. toggle B. switch C. simple D. click

Computer Science & Information Technology