A table of figures is a list of all the ____________________ for tables, charts, pictures, graphics, and equations in a document.

Fill in the blank(s) with the appropriate word(s).


captions

Computer Science & Information Technology

You might also like to view...

____ involves the management of vulnerabilities that are known to exist, but that have not yet led to a security incident.

A. Proactive change B. Preventive change C. Detective change D. Restrictive change

Computer Science & Information Technology

Cell referencing that combines elements of both absolute and relative referencing and is called a(n) switched reference. _________________________

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A Chief Executive Officer (CEO) is steering company towards cloud computing. The CEO is requesting a federated sign-on method to have users sign into the sales application. Which of the following methods will be effective for this purpose?

A. SAML B. RADIUS C. Kerberos D. LDAP

Computer Science & Information Technology

Microsoft Project is an example of software that is very powerful, but quite expensive. As a project manager, how would you justify the purchase of this software?

What will be an ideal response?

Computer Science & Information Technology