How are form fields identified?

A) Text boxes with a blue border and blue shading
B) Text boxes with a thick border
C) Thin border blocks
D) Shaded blocks

D

Computer Science & Information Technology

You might also like to view...

The aim of ____ is to maintain an optimum and secure relationship between each of the company's business processes and their respective information security functions.

A. formal governance B. informal governance C. formal auditing D. formal planning

Computer Science & Information Technology

The _____ is found at the top of the file system used by Windows. 

A. root directory B. subfolder C. system folder D. critical directory

Computer Science & Information Technology