How are form fields identified?
A) Text boxes with a blue border and blue shading
B) Text boxes with a thick border
C) Thin border blocks
D) Shaded blocks
D
Computer Science & Information Technology
You might also like to view...
The aim of ____ is to maintain an optimum and secure relationship between each of the company's business processes and their respective information security functions.
A. formal governance B. informal governance C. formal auditing D. formal planning
Computer Science & Information Technology
The _____ is found at the top of the file system used by Windows.
A. root directory B. subfolder C. system folder D. critical directory
Computer Science & Information Technology