A smaller version of a image that usually links to the larger image is called a:
a. hyperlink
b. thumbnail image
c. small image
d. wallpaper
b
Computer Science & Information Technology
You might also like to view...
The three cornerstones of voice network system security are availability,
a. circumvention, and confidentiality. b. circumvention, and disclosure. c. confidentiality, and integrity. d. disclosure, and integrity.
Computer Science & Information Technology
Which of the following lines of code would be considered invalid by a validating parser?
A.
This text is valid
B.
This text is validC.
This text is valid
Computer Science & Information Technology