____ is used to send short messages containing text only.

A. SMS
B. MMS
C. NNTP
D. POP

Answer: A

Computer Science & Information Technology

You might also like to view...

To specify that a field is to be required, change the value for the _____ property from No to Yes.

A. Required B. No Blanks C. Necessary D. Completed

Computer Science & Information Technology

Which of the following techniques floods an application with data in an attempt to find vulnerabilities?

A. Header manipulation B. Steganography C. Input validation D. Fuzzing

Computer Science & Information Technology