A comment can be edited when the selection handles and a ________ border are displayed

A) dashed blue B) solid black C) hash-mark D) double


C

Computer Science & Information Technology

You might also like to view...

In C++, a legal identifiers may contain these kinds of characters _______________, ______________, ______________

Fill in the blank(s) with correct word

Computer Science & Information Technology

Which of the following is NOT true about the Snipping Tool?

A) The Snipping Tool cannot be used to capture shortcut menus. B) The Snipping Tool was introduced so users did not have to use the Print Screen key and a photo editing tool. C) The Snipping Tool can be used in any area that requires taking snips of what is on a screen, such as to show a technical support person what an error on the screen looks like. D) The Snipping Tool can be used to take snips of all screens including the Lock Screen, Login Screen, and Start menu.

Computer Science & Information Technology

A network security engineer notices unusual traffic on the network from a single IP attempting to access systems on port 23. Port 23 is not used anywhere on the network. Which of the following should the engineer do to harden the network from this type of intrusion in the future?

A. Disable unnecessary services on servers B. Disable unused accounts on servers and network devices C. Implement password requirements on servers and network devices D. Enable auditing on event logs

Computer Science & Information Technology

Consider integer array values, which contains 5 elements. Which statements successfully swap the contents of the array at index 3 and index 4?

a) values[3] = values[4]; values[4] = values[3]; b) values[4] = values[3]; values[3] = values[4]; c) int temp = values[3]; values[3] = values[4]; values[4] = temp; d) int temp = values[3]; values[3] = values[4]; values[4] = values[3];

Computer Science & Information Technology