The symbols in an input mask that are replaced as the user types data into the field are called ________ characters
A) modal
B) layout
C) placeholder
D) input
C
Computer Science & Information Technology
You might also like to view...
Match the following terms to their meanings:
I. biometrics II. firewall III. proxy server IV. password V. username A. code used to access resources B. unique name on a network assigned to an authorized user C. a program that blocks unwanted or unsafe data D. body characteristics are used to access resources E. a function of the gateway that hides IP addresses
Computer Science & Information Technology
Virtual private networks (VPNs) establish a secure private connection over which of the following communication mediums?
A) Intranet B) Internet C) Secure network D) Internal network
Computer Science & Information Technology