A(n) ________ effect highlights an object or text that is already displayed

Fill in the blank(s) with correct word

Emphasis

Computer Science & Information Technology

You might also like to view...

The value in a table that is the primary key of another table is a(n) ________ key

Fill in the blank(s) with correct word

Computer Science & Information Technology

Why do many security monitoring systems produce a visualization of the collected results?

A. Security tools do not support spreadsheet presentations. B. The lists of text and numbers takes up too much screen space. C. It represents complex or bulky data in an easy to understand format. D. It is the only way to represent passively monitored systems.

Computer Science & Information Technology