The space between characters is called ____.

A. kerning
B. leading
C. tracking
D. weighing

Answer: A

Computer Science & Information Technology

You might also like to view...

What is the effect of executing STMIB r13!,{r0-r2,r4}? Draw a picture of the state of the stack pointed at by r13 before and after this operation.

What will be an ideal response?

Computer Science & Information Technology

In addition to deauthenticate messages, an attacker could flood wireless clients with ________.

RTS CTS Both RTS and CTS Neither RTS nor CTS

Computer Science & Information Technology