When you enter a password, the entry is masked with ____ for security.

A. bullets
B. numbers
C. letters
D. asterisks


Answer: A

Computer Science & Information Technology

You might also like to view...

The __________ and __________ operators can be used to increment or decrement a pointer variable.

a. addition, subtraction b. ++, -- c. modulus, division d. All of these e. None of these

Computer Science & Information Technology

The class GridLayout constructs to hold components.

a. a horizontal grid with one row b. a vertical grid with one column c. a grid with multiple rows and columns d. a square grid with the same number of rows as columns

Computer Science & Information Technology

To begin designing a relational database, one must define the _____ by defining each table and the fields in it.

A. primary key B. foreign key C. physical structure D. logical structure

Computer Science & Information Technology

What does the /etc/fstab file do?

What will be an ideal response?

Computer Science & Information Technology