________ is a visual representation of data or knowledge
A) WordArt B) An infographic C) A Smart Guide D) SmartArt
B
Computer Science & Information Technology
You might also like to view...
Malware that appears to be desirable software that presents itself as a genuine application is ________
A) virus B) botnet C) worm D) Trojan horse
Computer Science & Information Technology
The objective of a phishing attack is to entice e-mail recipients to click a bogus link where personal information can be stolen.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology