________ are boxes that describe the photographs
A) Captions
B) Photo boxes
C) Comments
D) File names
A
You might also like to view...
Draw diagonal lines on a picture from top right to bottom left using addLine.
What will be an ideal response?
Which share definition parameter in the Samba configuration file prevents users of a service from modifying files in the service's directory?
A. browseable B. read only C. inherit acls D. valid users
When a source is cited in a document, a(n) ________ appears to the left of its entry in the Current List in the Source Manager
A) check mark B) exclamation point C) asterisk D) plus sign
Investigations into hackers can be difficult because even with a full audit trail showing that a user came from a particular account on a particular ISP,
A) Often only billing information is available, which does not prove identity B) The hacker may use more than one ISP C) ISPs almost never release the necessary information D) All of the above