Input fields are sometimes referred to as ________
Fill in the blank(s) with correct word
input controls
Computer Science & Information Technology
You might also like to view...
The item on the left in the accompanying figure is a GIF file.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
A ____ attack is when hackers intercept information sent out over networks.
A. phishing B. pharming C. sniffing D. spamming
Computer Science & Information Technology