The destination of a hyperlink is called the ____________________.
Fill in the blank(s) with the appropriate word(s).
target
You might also like to view...
The main internal hard drive on a Windows computer is usually identified as the ________ drive
A) A: B) B: C) C: D) D:
Answer the following statements true (T) or false (F)
1) In a public-key algorithm, one key is used for both encryption and decryption. 2) Digital certificates are intended to be used indefinitely. 3) Secure Sockets Layer protects data stored on a merchant’s server. 4) Digital signatures can provide undeniable proof of the author of a document. 5) In a network of 10 users communicating using public-key cryptography, only 10 keys are needed in total.
To display a taskbar icon's Jump List, double-click the icon
Indicate whether the statement is true or false
The ____ keys move the active cell to the last column of the last row that contains a task name.
A. Shift+End B. Ctrl+End C. Alt+End D. Esc+End