Manipulating data is known as ________
Fill in the blank(s) with correct word
processing
Computer Science & Information Technology
You might also like to view...
How can you use NIS to mirror the functionality of a private DNS server for a small network? Why should NIS not be used this way on a large network?
What will be an ideal response?
Computer Science & Information Technology
Computers with low-bandwidth connections are more susceptible to hackers
Indicate whether the statement is true or false
Computer Science & Information Technology
The ____tool is used to draw complex shapes from a variety of choices.
a. Pen b. Deco c. PolyStar d. Pencil
Computer Science & Information Technology
Authorization is granting permission for admittance.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology