When you ____ an image, you transfer it from the Internet to your computer.
A. tweet
B. download
C. compress
D. none of the above
Answer: B
Computer Science & Information Technology
You might also like to view...
When creating a lookup list for the State field, what must you also consider?
What will be an ideal response?
Computer Science & Information Technology
________ controls focus on the response to a security breach, by warning of violations or attempted violations of security policies.
A. Technical B. Preventative C. Detection and recovery D. Management
Computer Science & Information Technology