The ____ tags are used to identify each choice in a drop-down list.
A.
B.
C.
D.
Answer: D
Computer Science & Information Technology
You might also like to view...
________ an image eliminates unwanted portions of the image
A) Trimming B) Cropping C) Clipping D) Snipping
Computer Science & Information Technology
Which of the following tools would Matt, a security administrator, MOST likely use to analyze a malicious payload?
A. Vulnerability scanner B. Fuzzer C. Port scanner D. Protocol analyzer
Computer Science & Information Technology