The program used to close security holes is called a(n) ________
Fill in the blank(s) with correct word
patch
Computer Science & Information Technology
You might also like to view...
Changes made to the Slide Master in PowerPoint will NOT affect all the other slide layouts
Indicate whether the statement is true or false
Computer Science & Information Technology
A(n) ________ is text that prints at the bottom of every page of a document
Fill in the blank(s) with correct word
Computer Science & Information Technology