By default, table captions are placed ____ the table.

A. below
B. above
C. to the right of
D. to the left of

Answer: B

Computer Science & Information Technology

You might also like to view...

A(n) ____________________ is a memory location whose contents can be changed.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A(n) _____ is a network attack in which an intruder gains access to a network and stays undetected with the intention of stealing data.

a. advanced persistent threat b. vishing scam c. identity threat d. data breach

Computer Science & Information Technology