List levels, which are similar to outline levels, are represented by a bullet symbol

Indicate whether the statement is true or false

TRUE

Computer Science & Information Technology

You might also like to view...

A recent online password audit has identified that stale accounts are at risk to brute force attacks. Which the following controls would best mitigate this risk?

A. Password length B. Account disablement C. Account lockouts D. Password complexity

Computer Science & Information Technology

A list of operations that is displayed on the screen, allowing the user to select one of these options is known as a(n) __________.

a. list b. option list c. menu d. choice

Computer Science & Information Technology