What is the primary input device of a computer?
A. monitor
B. keyboard
C. mouse
D. speakers
Ans: B. keyboard
Computer Science & Information Technology
You might also like to view...
Hiding an object, such as a diary, to prevent others from finding it is an example
A. trust B. cryptography C. Security through Obscurity D. transposition
Computer Science & Information Technology
____________________ injections are attacks made with little to no knowledge of the system.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
You use the Style Pane Options dialog box to change how styles display in the Styles pane
Indicate whether the statement is true or false
Computer Science & Information Technology
When you include table names in a structure reference it is called a(n) ________ structured reference
Fill in the blank(s) with correct word
Computer Science & Information Technology