Modifying someone else’s code and claiming that it is your own is called __________.

a. plagiarism
b. hacking
c. computer abuse
d. computer fraud
e. none of the above


A

Computer Science & Information Technology

You might also like to view...

________ connect computers that are physically close, generally in the same building.

a) WANs. b) LANs. c) SANs. d) None of the above.

Computer Science & Information Technology

A keyboard access key is assigned to a button using the button control’s __________ property.

a. ShortCut b. Text c. AccessKey d. Alt

Computer Science & Information Technology

Syntax (as it applies to Excel 2010)

A) is a set of rules that govern the structure and components for a function. B) is an input such as a cell reference or a value needed to complete a function. C) is a small pop-up description that displays the arguments for a function as you enter it. D) displays a list of functions and defined names as you enter a function.

Computer Science & Information Technology

The font-variant property controls the size of the font.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology