Which of the following should you use to protect your customer's sensitive data from being accessed by unauthorized people?
A. HTTP
B. FTP
C. HTTPS
D. HTML5
Answer: C
Computer Science & Information Technology
You might also like to view...
Which of the following events should be used to enable the user to move Alice forward by clicking the up arrow key?
a. Let the mouse move the camera
b. Let the arrow keys move
Computer Science & Information Technology
Use the _______ property to configure a linear gradient.
a. linear-gradient b. background-color c. background-image d. opacity
Computer Science & Information Technology
A(n) ________ list is usually used to display data that has some type of order
Fill in the blank(s) with correct word
Computer Science & Information Technology
The STL provides ____ types of generic list structures.
A. four B. seven C. nine D. sixteen
Computer Science & Information Technology