The Charms are also known as ________

A) buttons
B) Gif files
C) JPEG files
D) GUI files


A

Computer Science & Information Technology

You might also like to view...

Method _______ displays text in an Entry.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A(n) ____ proof is a copy you look at on the screen.

a. final b. editing c. hard d. soft

Computer Science & Information Technology

The ____________________ is a written record of all interaction with the evidence from the moment it is acquired to the moment it is released.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

What kind of digital certificate is typically used to ensure the authenticity of a web server to a client?

A. private B. web server C. public web D. web client

Computer Science & Information Technology