The Grow Font button appears on the ____ tab.
A. Fonts
B. Home
C. Styles
D. Layouts
Answer: B
You might also like to view...
In a ____ attack, a hacker sends to the target computer a packet that has the identical source and destination IP address as that of the target computer.?
A. DNS overflow? B. ?Teardrop C. ?Land D. ?Chargen
The command spell xyx > correct
a: spell checks xyz and displays the corrected file b: spell checks xyz and the output is saved in correct c: spell checks xyz and correct d. spell checks xyz and uses correct as the checking dictionary e: spell checks xyz and creates a dictionary called correct
A wired network adapter with a port that resembles a telephone jack.
A. FireWire B. Modem C. Ethernet card
If a technician is trying to remote into a computer through a firewall, which of the following ports, by default, MUST be forwarded?
A. 21 B. 25 C. 110 D. 3389