When applying the design principle of __________ related items are grouped together

a. linear
b. proximity
c. repetition
d. alignment


b

Computer Science & Information Technology

You might also like to view...

Which firewall-cmd command would verify that the FTP service was trusted in the runtime configuration? In the permanent configuration?

What will be an ideal response?

Computer Science & Information Technology

Which of the following is true about the steps in setting up and using an IDPS?

A. anomaly-based systems come with a database of attack signatures B. sensors placed on network segments will always capture every packet C. alerts are sent when a packet doesn't match a stored signature D. false positives do not compromise network security

Computer Science & Information Technology

A program or class that instantiates objects of another prewritten class is a ____ or class user.

A. class slave B. class object C. class master D. class client

Computer Science & Information Technology

A 10BaseT network uses __________________ connectors.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology