____________________ is the process of marking a file or files for exclusion when the commands Put, Get, Synchronize, Check In, or Check Out are used.
Fill in the blank(s) with the appropriate word(s).
Cloaking
Computer Science & Information Technology
You might also like to view...
What is the difference between letter spacing and word spacing?
What will be an ideal response?
Computer Science & Information Technology
Images that are ____________________ may still require a payment, but it is usually a one-time fee.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
What is an advantage of a point-to-point topology?
A. data travels on a dedicated link B. provides redundancy and fault tolerance C. relatively inexpensive D. a reliable and fast backbone
Computer Science & Information Technology
Fixed layouts can involve a tremendous amount of horizontal _________ and require much zooming on small viewports.?
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology