____________________ is the process of marking a file or files for exclusion when the commands Put, Get, Synchronize, Check In, or Check Out are used.

Fill in the blank(s) with the appropriate word(s).


Cloaking

Computer Science & Information Technology

You might also like to view...

What is the difference between letter spacing and word spacing?

What will be an ideal response?

Computer Science & Information Technology

Images that are ____________________ may still require a payment, but it is usually a one-time fee.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

What is an advantage of a point-to-point topology?

A. data travels on a dedicated link B. provides redundancy and fault tolerance C. relatively inexpensive D. a reliable and fast backbone

Computer Science & Information Technology

Fixed layouts can involve a tremendous amount of horizontal _________ and require much zooming on small viewports.?

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology