Match the term with its use

4. E-chip blocking software a. fragments data and places on various servers
5. Data encryption b. filters information, though unable to distinguish between legitimate and indecent information
6. Data stripping c. provides privacy and security for consumers by protecting data


Answer: 4. b
5. c
6. a

Computer Science & Information Technology

You might also like to view...

At the Start screen, you can type all or part of a file name in the taskbar.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

In a data table, the ____ value results from the application of a formula reference.

A. output B. variable C. input D. target

Computer Science & Information Technology

Answer the following statement(s) true (T) or false (F)

The Spanning Tree Protocol operates at the Network layer of the OSI model.

Computer Science & Information Technology

A(n) ____________________ is a security management system that compiles information from a computer network or individual computer and then analyzes it to identify security vulnerabilities and attacks.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology