"I want to confirm that, with the changes we made to your software, you can now enlarge the font in your document." is an example of ____.

A. paraphrasing
B. verification
C. explanation
D. replication


Answer: B

Computer Science & Information Technology

You might also like to view...

Which of the following Trojan horse actions would allow an attacker to gain access to the victim’s system?

A) Erase files on a computer. B) Launch a DDoS attack. C) Spread other malware. D) Install a backdoor on a computer.

Computer Science & Information Technology

Backing up a shortcut or alias will back up the file or folder to which it links

Indicate whether the statement is true or false

Computer Science & Information Technology

The default importance level for all new messages is ____ importance.

A. low B. high C. normal D. urgent

Computer Science & Information Technology

______ software is a centralized logging software package similar to, but much more complex than, syslog.

A. NetScan B. McAfee C. IPConfig D. SIEM

Computer Science & Information Technology