After inserting a footnote into a document, a ____ is added where the insertion point was located.
A. superscript number
B. bold-faced number
C. superscript letter
D. bold-faced letter
Answer: A
You might also like to view...
General controls for personnel security implement such classic cybersecurity principles as separation of duties, job rotation, and ____.
A. classification B. mandatory vacations C. separation of concerns D. risk mitigation
If the following Java statements are executed, what will be displayed?
System.out.println("The top three winners are\n"); System.out.print("Jody, the Giant\n"); System.out.print("Buffy, the Barbarian"); System.out.println("Adelle, the Alligator"); a. The top three winners are Jody, the Giant Buffy, the Barbarian Adelle, the Alligator b. The top three winners are Jody, the Giant\nBuffy, the BarbarianAdelle, and the Albino c. The top three winners are Jody, the Giant\nBuffy, the BarbarianAdelle, the Alligator d. The top three winners are Jody, the Giant Buffy, the BarbarianAdelle, the Alligator