The ____________________ behavior replaces one image with another upon a specified event, usually a mouseover.

Fill in the blank(s) with the appropriate word(s).


image swap

Computer Science & Information Technology

You might also like to view...

The ____ approach to network security entails a partitioned or subdivided topology.

A. segmented B. hub C. spoke D. ring

Computer Science & Information Technology

In an UPDATE statement, the SET keyword is followed by _________.

a. a comma-separated list of column value-name pairs in the format value = columnName b. a comma-separated list of column name-value pairs in the format columnName = value c. a semicolon-separated list of column value-name pairs in the format value = columnName d. a semicolon-separated list of column name-value pairs in the format columnName = value

Computer Science & Information Technology

The formula =$C3*D3 is located in cell B2. If this was copied and pasted into cell B3, what would the resulting formula be:

A. =$C3*$D4 B. =$C$3*C3 C. =$C4*D4 D. =C4:D4 E. =$C4*E3

Computer Science & Information Technology

Which of the following is port 123 commonly used for?

A. IMAP4 B. HTTPS C. NTP D. DNS

Computer Science & Information Technology