After you enter and save contact information, that information is available as you compose ____________________.

Fill in the blank(s) with the appropriate word(s).

email messages

Computer Science & Information Technology

You might also like to view...

A _________ is an individual who is not authorized to use the computer and who penetrates a system's access controls to exploit a legitimate user's account. ?

A) ?sniffer ?? B) ?misfeasor C) ?clandestine user ? D) ?masquerader

Computer Science & Information Technology

The combination of user login plus password is called ____ authentication.

A. ?multifactor B. ?single-factor C. ?unbreakable D. ?strong

Computer Science & Information Technology