24.The use of the Internet, cell phones, or other devices to send or post content intended to hurt orembarrass another person.A. identity theftC.auction fraudB. snoopwareD.Cyberbullying
25.Which of the following is the most widely used wireless network encryption for home wirelessnetworks?WEPWPE
Get answer to your question and much more
26.When copying a table from MS Excel to MS word with a link between them so that when changes madeto source file is automatically reflected in the destination file; this process is known as
Get answer to your question and much more
27.Copying a formula from a cell in a worksheet and pasting it to other related cell whereby cell referenceschanges automatically. This happens because of
Get answer to your question and much more
28.With internal CSS, the styling code is writtenA. in external file.C.within body tag only.B. within style element within head element.D.within each element tag.
29.Choose the correct HTML tag for inserting table in an html document.
Get answer to your question and much more
30.Which of the following CSS code will apply theTahomafont property to theentirehtml document?
Get answer to your question and much more