Side headings are keyed at the ____.

A. center of the page
B. left margin
C. right edge of the page
D. end of the report


Answer: B

Computer Science & Information Technology

You might also like to view...

Which of the following is used to interfere with normal access to network resources by flooding a network with useless information?

A. denial-of-service attack B. buffer attack C. Trojan horse D. worm

Computer Science & Information Technology

Saving a database with a different file name leaves the file in Exclusive Access mode

Indicate whether the statement is true or false

Computer Science & Information Technology

A built-in Table Style cannot be applied unless the entire table is selected

Indicate whether the statement is true or false

Computer Science & Information Technology

Briefly describe IP route on a Cisco router.

What will be an ideal response?

Computer Science & Information Technology