A common way to move an object from one location to another using a mouse is to ______.
A. point
B. drag
C. right-click
D. double-click
Answer: B
You might also like to view...
The aim of ____ is to maintain an optimum and secure relationship between each of the company's business processes and their respective information security functions.
A. formal governance B. informal governance C. formal auditing D. formal planning
Each programming language has its own ____________, which is a set of rules that must be strictly followed when writing a program.
a. syntax b. convention c. conversion rules d. structure
How is the code for an index entry field formatted?
A) grayed out B) italic C) hidden D) bold
Actions ranging from creating viruses to disrupting computer networks are often referred to as:
A. scareware B. social engineering C. cybercrimes D. data mining