The destination of a hyperlink is called the ____________________.

Fill in the blank(s) with the appropriate word(s).


target

Computer Science & Information Technology

You might also like to view...

The main internal hard drive on a Windows computer is usually identified as the ________ drive

A) A: B) B: C) C: D) D:

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

1) In a public-key algorithm, one key is used for both encryption and decryption. 2) Digital certificates are intended to be used indefinitely. 3) Secure Sockets Layer protects data stored on a merchant’s server. 4) Digital signatures can provide undeniable proof of the author of a document. 5) In a network of 10 users communicating using public-key cryptography, only 10 keys are needed in total.

Computer Science & Information Technology

To display a taskbar icon's Jump List, double-click the icon

Indicate whether the statement is true or false

Computer Science & Information Technology

The ____ keys move the active cell to the last column of the last row that contains a task name.

A. Shift+End B. Ctrl+End C. Alt+End D. Esc+End

Computer Science & Information Technology