_________ are used as masking characters in a password box.
Fill in the blank(s) with the appropriate word(s).
Asterisks.
Computer Science & Information Technology
You might also like to view...
A logic bomb is malware that is designed to do harm to the system when some logical condition is reached.
a. true b. false
Computer Science & Information Technology
Which of the following statements is true?
a. Strings can be used in a switch statement’s controlling expression and in its case labels. b. Strings can be used in a switch statement’s controlling expression but not in its case labels. c. Strings cannot be used in a switch statement’s controlling expression but can be used in its case labels. d. Strings cannot be used in a switch statement’s controlling expression and cannot be used in its case labels.
Computer Science & Information Technology