When you use the mouse to select an array of objects, you have created a(n) ________

Fill in the blank(s) with correct word

selection net

Computer Science & Information Technology

You might also like to view...

The Chief Information Security Officer (CISO) is concerned that users could bring their personal laptops to work and plug them directly into the network port under their desk. Which of the following should be configured on the network switch to prevent this from happening?

A. Access control lists B. Loop protection C. Firewall rule D. Port security

Computer Science & Information Technology

An unstructured approach to security testing is very ineffective and can result in wasted resources.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology