Mouse and keyboard events are both known as ____ events.
A. peripheral
B. static
C. user
D. alternate
Answer: C
Computer Science & Information Technology
You might also like to view...
The set of rules that Access follows when evaluating expressions in calculated fields is called ________
Fill in the blank(s) with correct word
Computer Science & Information Technology
The three cornerstones of voice network system security are availability,
a. circumvention, and confidentiality. b. circumvention, and disclosure. c. confidentiality, and integrity. d. disclosure, and integrity.
Computer Science & Information Technology