Match the term with its use
4. E-chip blocking software a. fragments data and places on various servers
5. Data encryption b. filters information, though unable to distinguish between legitimate and indecent information
6. Data stripping c. provides privacy and security for consumers by protecting data
Answer: 4. b
5. c
6. a
You might also like to view...
At the Start screen, you can type all or part of a file name in the taskbar.
Answer the following statement true (T) or false (F)
In a data table, the ____ value results from the application of a formula reference.
A. output B. variable C. input D. target
Answer the following statement(s) true (T) or false (F)
The Spanning Tree Protocol operates at the Network layer of the OSI model.
A(n) ____________________ is a security management system that compiles information from a computer network or individual computer and then analyzes it to identify security vulnerabilities and attacks.
Fill in the blank(s) with the appropriate word(s).