____ is used to send short messages containing text only.
A. SMS
B. MMS
C. NNTP
D. POP
Answer: A
Computer Science & Information Technology
You might also like to view...
To specify that a field is to be required, change the value for the _____ property from No to Yes.
A. Required B. No Blanks C. Necessary D. Completed
Computer Science & Information Technology
Which of the following techniques floods an application with data in an attempt to find vulnerabilities?
A. Header manipulation B. Steganography C. Input validation D. Fuzzing
Computer Science & Information Technology