________ is a visual representation of data or knowledge

A) WordArt B) An infographic C) A Smart Guide D) SmartArt

B

Computer Science & Information Technology

You might also like to view...

Malware that appears to be desirable software that presents itself as a genuine application is ________

A) virus B) botnet C) worm D) Trojan horse

Computer Science & Information Technology

The objective of a phishing attack is to entice e-mail recipients to click a bogus link where personal information can be stolen.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology