The Grow Font button appears on the ____ tab.

A. Fonts
B. Home
C. Styles
D. Layouts


Answer: B

Computer Science & Information Technology

You might also like to view...

In a ____ attack, a hacker sends to the target computer a packet that has the identical source and destination IP address as that of the target computer.?

A. DNS overflow? B. ?Teardrop C. ?Land D. ?Chargen

Computer Science & Information Technology

The command spell xyx > correct

a: spell checks xyz and displays the corrected file b: spell checks xyz and the output is saved in correct c: spell checks xyz and correct d. spell checks xyz and uses correct as the checking dictionary e: spell checks xyz and creates a dictionary called correct

Computer Science & Information Technology

A wired network adapter with a port that resembles a telephone jack.

A. FireWire B. Modem C. Ethernet card

Computer Science & Information Technology

If a technician is trying to remote into a computer through a firewall, which of the following ports, by default, MUST be forwarded?

A. 21 B. 25 C. 110 D. 3389

Computer Science & Information Technology