When you change the appearance of text, you are ________ the text

A) referencing B) formatting C) editing D) copying

B

Computer Science & Information Technology

You might also like to view...

After you add a button to the Quick Access Toolbar, you should test it to ensure that the button performs as you want it to

Indicate whether the statement is true or false

Computer Science & Information Technology

A growing illegal use of computer monitoring software is for a hacker to use a(n) ____________________ system to capture usernames, passwords, and other sensitive data entered into the computer via the keyboard.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology