After you enter and save contact information, that information is available as you compose ____________________.
Fill in the blank(s) with the appropriate word(s).
email messages
Computer Science & Information Technology
You might also like to view...
A _________ is an individual who is not authorized to use the computer and who penetrates a system's access controls to exploit a legitimate user's account. ?
A) ?sniffer ?? B) ?misfeasor C) ?clandestine user ? D) ?masquerader
Computer Science & Information Technology
The combination of user login plus password is called ____ authentication.
A. ?multifactor B. ?single-factor C. ?unbreakable D. ?strong
Computer Science & Information Technology