The ____________________ print style prints a list of contacts showing phone numbers only.

Fill in the blank(s) with the appropriate word(s).


Phone Directory

Computer Science & Information Technology

You might also like to view...

In simple terms, the wireless environment consists of three components that provide point of attack: the endpoint, the ______________, and the access point.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Standard screen mode displays the ____.

a. Application bar b. document window c. scroll bars d. visible panels

Computer Science & Information Technology

The maximum number of bytes that can be allocated to a single file in UNIX is ____.

A. 128 B. 16,522 C. 2,113,674 D. 1,082,201,088

Computer Science & Information Technology

Which of the following is not an advantage of AES over 3DES?

A. AES can be used in Asymmetric Encryption B. AES offers three alternative key lengths instead of two. C. AES is efficient enough in terms of processing power and RAM requirements to be used on a wide variety of devices. D. AES can be used with small mobile devices

Computer Science & Information Technology