While attempting to identify the problem, you should _______________ the user and identify user changes to the computer.
Fill in the blank(s) with the appropriate word(s).
question
correct
You might also like to view...
A ____ is a custom form that shows only the fields a particular user wants.
A. main form B. subform C. user view D. subdatasheet
________ is used to modify a document by using styles stored in another document or template
A) Style Inspector B) Reveal Formatting. C) Organizer. D) Format Painter
Encryption is the process of scrambling plain text into an unreadable format using a mathematical formula known as a(n) ________
a. Algorithm b. Skimmer c. Heuristic d. None of the above
The _________ is an actual network made up of wires, cables, satellites, and rules for exchanging information between computers connected to the network
Fill in the blank(s) with the appropriate word(s).