The symbols in an input mask that are replaced as the user types data into the field are called ________ characters

A) modal
B) layout
C) placeholder
D) input

C

Computer Science & Information Technology

You might also like to view...

Match the following terms to their meanings:

I. biometrics II. firewall III. proxy server IV. password V. username A. code used to access resources B. unique name on a network assigned to an authorized user C. a program that blocks unwanted or unsafe data D. body characteristics are used to access resources E. a function of the gateway that hides IP addresses

Computer Science & Information Technology

Virtual private networks (VPNs) establish a secure private connection over which of the following communication mediums?

A) Intranet B) Internet C) Secure network D) Internal network

Computer Science & Information Technology