Which of the following should you use to protect your customer's sensitive data from being accessed by unauthorized people?

A. HTTP
B. FTP
C. HTTPS
D. HTML5


Answer: C

Computer Science & Information Technology

You might also like to view...

Which of the following events should be used to enable the user to move Alice forward by clicking the up arrow key?

a. Let the mouse move the camera b. Let the arrow keys move c. When a key is typed d. When the world starts e. None of these

Computer Science & Information Technology

Use the _______ property to configure a linear gradient.

a. linear-gradient b. background-color c. background-image d. opacity

Computer Science & Information Technology

A(n) ________ list is usually used to display data that has some type of order

Fill in the blank(s) with correct word

Computer Science & Information Technology

The STL provides ____ types of generic list structures.

A. four B. seven C. nine D. sixteen

Computer Science & Information Technology