_________ are used as masking characters in a password box.

Fill in the blank(s) with the appropriate word(s).

Asterisks.

Computer Science & Information Technology

You might also like to view...

A logic bomb is malware that is designed to do harm to the system when some logical condition is reached.

a. true b. false

Computer Science & Information Technology

Which of the following statements is true?

a. Strings can be used in a switch statement’s controlling expression and in its case labels. b. Strings can be used in a switch statement’s controlling expression but not in its case labels. c. Strings cannot be used in a switch statement’s controlling expression but can be used in its case labels. d. Strings cannot be used in a switch statement’s controlling expression and cannot be used in its case labels.

Computer Science & Information Technology