______ are used to prevent others from using your personal data or accessing your documents
Fill in the blank(s) with correct word
Passwords
Computer Science & Information Technology
You might also like to view...
A logical function that returns a result of TRUE if all of the conditions are met
A) IF B) NOT C) AND D) OR
Computer Science & Information Technology
What distance vector (DV) feature tells the routing protocol to not advertise routes out the same interface on which the route was learned?
A) Split horizon B) Poison reverse C) Reverse telnet D) Passive interface
Computer Science & Information Technology