The empty space at the top, bottom, left, and right side of a document is called a ________

A) border
B) margin
C) template
D) selection

B

Computer Science & Information Technology

You might also like to view...

Business Continuity Planning is interested in ________ disasters if possible

A) planning B) reacting to C) recognizing D) avoiding

Computer Science & Information Technology

During a security audit, Susan discovers that the organization is using hand geometry scanners as the access control mechanism for their secure data center. What recommendation should Susan make about the use of hand geometry scanners?

A. They have a high FRR and should be replaced. B. A second factor should be added because they are not a good way to reliably distinguish individuals. C. The hand geometry scanners provide appropriate security for the data center and should be considered for other high-security areas. D. They may create accessibility concerns, and an alternate biometric system should be considered.

Computer Science & Information Technology