List levels, which are similar to outline levels, are represented by a bullet symbol
Indicate whether the statement is true or false
TRUE
Computer Science & Information Technology
You might also like to view...
A recent online password audit has identified that stale accounts are at risk to brute force attacks. Which the following controls would best mitigate this risk?
A. Password length B. Account disablement C. Account lockouts D. Password complexity
Computer Science & Information Technology
A list of operations that is displayed on the screen, allowing the user to select one of these options is known as a(n) __________.
a. list b. option list c. menu d. choice
Computer Science & Information Technology