Input fields are sometimes referred to as ________

Fill in the blank(s) with correct word

input controls

Computer Science & Information Technology

You might also like to view...

The item on the left in the accompanying figure is a GIF file.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A ____ attack is when hackers intercept information sent out over networks.

A. phishing B. pharming C. sniffing D. spamming

Computer Science & Information Technology