Use the ____ element to configure a table heading cell.

a. td
b. th
c. head
d. tr

c. head

Computer Science & Information Technology

You might also like to view...

Attempting to access an array element outside of the bounds of an array, causes a(n) .

a. ArrayOutOfBoundsException. b. ArrayElementOutOfBoundsException. c. ArrayIndexOutOfBoundsException. d. ArrayException.

Computer Science & Information Technology

__________ applications use a combination of techniques to detect an intrusion and then trace it back to its source.

A. Honeynet B. Trap-and-trace C. HIDPS D. Packet sniffer

Computer Science & Information Technology