When you ____ an image, you transfer it from the Internet to your computer.

A. tweet
B. download
C. compress
D. none of the above

Answer: B

Computer Science & Information Technology

You might also like to view...

When creating a lookup list for the State field, what must you also consider?

What will be an ideal response?

Computer Science & Information Technology

________ controls focus on the response to a security breach, by warning of violations or attempted violations of security policies.

A. Technical B. Preventative C. Detection and recovery D. Management

Computer Science & Information Technology