Choose the preferred element to use when configuring important text that is intended to be displayed a bold font style.
a. i
b. strong
c. em
d. b
b. strong
Computer Science & Information Technology
You might also like to view...
Kyle asked his supervisor which type of computing model was used when the enterprise first started. She explained that the organization purchased all the hardware and software necessary to run the company. What type of model was she describing to Kyle?
a. Virtual services b. Off-premises c. On-premises d. Hosted services
Computer Science & Information Technology
All of the following can protect you from hackers EXCEPT ________
A) antispam software B) a hardware firewall C) a software firewall D) the Windows firewall
Computer Science & Information Technology