The Charms are also known as ________
A) buttons
B) Gif files
C) JPEG files
D) GUI files
A
Computer Science & Information Technology
You might also like to view...
Method _______ displays text in an Entry.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
A(n) ____ proof is a copy you look at on the screen.
a. final b. editing c. hard d. soft
Computer Science & Information Technology
The ____________________ is a written record of all interaction with the evidence from the moment it is acquired to the moment it is released.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
What kind of digital certificate is typically used to ensure the authenticity of a web server to a client?
A. private B. web server C. public web D. web client
Computer Science & Information Technology