When some uses a person's name to find online information about them, it is said that the person has been ________

Fill in the blank(s) with correct word


Googled

Computer Science & Information Technology

You might also like to view...

The ________ options, in the Arrange group, under the FORMAT tab, enable you to place an object in a preset location within a document with Square text wrapping

A) Format B) Sizing C) Paste D) Position

Computer Science & Information Technology

What are the two major components of the SQL server virtual memory architecture?

What will be an ideal response?

Computer Science & Information Technology

An Ethernet network port contains a(n) __________ connector

Fill in the blank(s) with correct word

Computer Science & Information Technology

Procedures for adding users, removing users, and dealing with security issues are examples of ___________ policies

a. User b. Computer c. System administration d. Password

Computer Science & Information Technology