The program used to close security holes is called a(n) ________

Fill in the blank(s) with correct word

patch

Computer Science & Information Technology

You might also like to view...

Changes made to the Slide Master in PowerPoint will NOT affect all the other slide layouts

Indicate whether the statement is true or false

Computer Science & Information Technology

A(n) ________ is text that prints at the bottom of every page of a document

Fill in the blank(s) with correct word

Computer Science & Information Technology