The ____ procedure removes a form from the user's screen so that it does not cover up the information it references.
A. Remove
B. Minimize
C. Hide
D. Vanish
Answer: C
You might also like to view...
Which of the following is a snippet of code designed to automate tasks and often used by attackers to carry out denial-of-service attacks?
A) Ransomware B) Screen scraper C) Zero-day exploit D) Bot
____ replaces a series of similarity colored pixels with a binary code that indicates the number of pixels and their colors.
A. Run-length encoding B. Phishing C. File compression D. E-mail client software
________ is an intermediate operation that transforms a stream’s elements to new values and produces a stream containing the resulting (possibly different type) elements.
a. Transforming b. Converting c. Mapping d. Translating
XHTML requires the ________ attribute when creating an image map
Fill in the blank(s) with correct word