A lookup method in which each new character you type into a search box helps further refine the search is called ________

Fill in the blank(s) with correct word

word wheel

Computer Science & Information Technology

You might also like to view...

Key attributes are ________ in an entity relationship diagram

Fill in the blank(s) with correct word

Computer Science & Information Technology

Which of the following cryptographic concepts has been widely discredited among the information security community?

a. Confidentiality b. Nonrepudiation c. Security though obscurity d. Integrity e. Authentication

Computer Science & Information Technology