A smaller version of a image that usually links to the larger image is called a:

a. hyperlink
b. thumbnail image
c. small image
d. wallpaper

b

Computer Science & Information Technology

You might also like to view...

The three cornerstones of voice network system security are availability,

a. circumvention, and confidentiality. b. circumvention, and disclosure. c. confidentiality, and integrity. d. disclosure, and integrity.

Computer Science & Information Technology

Which of the following lines of code would be considered invalid by a validating parser?

A.
This text is valid B.

This text is valid 
C. This text is valid
D.
This text is valid

Computer Science & Information Technology