An unauthorized person can be prevented from viewing a presentation by adding a(n) ________

Fill in the blank(s) with correct word

password

Computer Science & Information Technology

You might also like to view...

_______________ antennas have a shorter range but do not have to be precisely aimed at the receiver.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Create a prototype for a phishing attack pattern.

What will be an ideal response?

Computer Science & Information Technology