The figure above shows the ____.

A. List Properties dialog box
B. HTML Lists inspector
C. HTML Property inspector
D. Semantic Web Property inspector


Answer: C

Computer Science & Information Technology

You might also like to view...

The ____ exploit is more characteristic of an attacker who has insider knowledge, or who might be an actual insider.

A. zero-knowledge B. partial-knowledge C. closed-knowledge D. full-knowledge

Computer Science & Information Technology

You can think of bitmap graphics (also called ____ graphics) as very sophisticated mosaics.

A. vector B. raster C. photo D. allied

Computer Science & Information Technology

When you query a database, there is a defined order in which the results are displayed.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which category rating uses a bandwidth of 250 MHz to accommodate 10000 Mbps?

A. CAT 3 B. CAT 5 C. CAT 6 D. CAT 8    

Computer Science & Information Technology