The ____ tags are used to identify each choice in a drop-down list.

A.


  • B.
    C.

    D.

    Answer: D

    Computer Science & Information Technology

    You might also like to view...

    ________ an image eliminates unwanted portions of the image

    A) Trimming B) Cropping C) Clipping D) Snipping

    Computer Science & Information Technology

    Which of the following tools would Matt, a security administrator, MOST likely use to analyze a malicious payload?

    A. Vulnerability scanner B. Fuzzer C. Port scanner D. Protocol analyzer

    Computer Science & Information Technology