A string of characters used to control access to a network or program is called a(n) ________
Fill in the blank(s) with correct word
passphrase
Computer Science & Information Technology
You might also like to view...
You can use the ________ to save different groups of assumptions and to switch to those scenarios to view the results
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
To create a faux column background image, you need to use a(n) ____ program such as Microsoft Expression Design or Adobe Photoshop.
A. animation B. graphics editing C. text editing D. presentation
Computer Science & Information Technology
Once you select a clip and insert it in a document, you can enhance it by applying ____ styles to it.
A. clip B. image C. graphic D. picture
Computer Science & Information Technology
How does software differ from the artifacts produced by other engineering disciplines?
What will be an ideal response?
Computer Science & Information Technology