Choose the preferred element to use when configuring important text that is intended to be displayed a bold font style.

a. i
b. strong
c. em
d. b

b. strong

Computer Science & Information Technology

You might also like to view...

Kyle asked his supervisor which type of computing model was used when the enterprise first started. She explained that the organization purchased all the hardware and software necessary to run the company. What type of model was she describing to Kyle?

a. Virtual services b. Off-premises c. On-premises d. Hosted services

Computer Science & Information Technology

All of the following can protect you from hackers EXCEPT ________

A) antispam software B) a hardware firewall C) a software firewall D) the Windows firewall

Computer Science & Information Technology