______ are used to prevent others from using your personal data or accessing your documents

Fill in the blank(s) with correct word

Passwords

Computer Science & Information Technology

You might also like to view...

A logical function that returns a result of TRUE if all of the conditions are met

A) IF B) NOT C) AND D) OR

Computer Science & Information Technology

What distance vector (DV) feature tells the routing protocol to not advertise routes out the same interface on which the route was learned?

A) Split horizon B) Poison reverse C) Reverse telnet D) Passive interface

Computer Science & Information Technology