________ are the names assigned to figures in a document

A) References B) Title C) Labels D) Captions


D

Computer Science & Information Technology

You might also like to view...

To convert an integer to a variable of type string one can use the C++11 function _____________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Column labels (A, B, C, and so on) display in a Word table

Indicate whether the statement is true or false

Computer Science & Information Technology

Six characters or more constitutes a strong password

Indicate whether the statement is true or false

Computer Science & Information Technology

What is the first step for the adoption of an organizational security policy once it is written?

A. Obtain management approval. B. Conduct personnel training. C. Develop the standards and procedures that support the policy. D. Establish security baselines.

Computer Science & Information Technology