The print ____________________ is the list of files to be printed.

Fill in the blank(s) with the appropriate word(s).


queue

Computer Science & Information Technology

You might also like to view...

Which of the following statements are true?

a. A dynamic array can have a base type which is a class or a struct. b. A class or a struct may have a member which is a dynamic array. c. A and B d. Neither

Computer Science & Information Technology

Match the identity theft/fraud with the example

Identity Theft/Fraud Example 1. Assumption of identity a. Michelle provided false information about herself and created a fictitious identity so as to engage in online flirtation. 2. Theft for employment b. Matthew used a stolen driver's license to open a fake bank account and acquire false credit cards. 3. Reverse criminal record identity theft c. Ashley stole personal information from her neighbor to create documents that helped her gain entry into the United States. 4. Virtual identity fraud d. Joshua changes physical characteristics, analyzes personal histories, and masters communication nuances of his friend Jason. 5. Credit or financial theft e. To protect herself from her criminal record, Amanda used her mother's ID to apply for government benefits.

Computer Science & Information Technology

A potential weakness in an asset or its defensive control system(s) is known as a(n) ?_________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The Info screen in Backstage view contains a(n) ____ Media button as well as the Compress Media button.

A. Maximize B. Minimize C. Optimize D. Recycle

Computer Science & Information Technology