Modifying someone else’s code and claiming that it is your own is called __________.
a. plagiarism
b. hacking
c. computer abuse
d. computer fraud
e. none of the above
A
You might also like to view...
________ connect computers that are physically close, generally in the same building.
a) WANs. b) LANs. c) SANs. d) None of the above.
A keyboard access key is assigned to a button using the button control’s __________ property.
a. ShortCut b. Text c. AccessKey d. Alt
Syntax (as it applies to Excel 2010)
A) is a set of rules that govern the structure and components for a function. B) is an input such as a cell reference or a value needed to complete a function. C) is a small pop-up description that displays the arguments for a function as you enter it. D) displays a list of functions and defined names as you enter a function.
The font-variant property controls the size of the font.
Answer the following statement true (T) or false (F)