Which of the following is a place where steganography can hide data?

A. in the metadata of a file
B. in the directory structure of the file system
C. in the hard disk master boot record
D. in the file allocation table


Answer: A

Computer Science & Information Technology

You might also like to view...

If the fsck utility finds a misplaced directory or a file with no inode number, it places these directories and files in the ____ directory, which is created on each partition.

A. /lost+found B. /temp C. /corrupt D. /fdsk

Computer Science & Information Technology

When are subforms created?

A) When the main form displays records from a related table B) When two fields are next to each other in a table C) When you have an autonumber field as the primary key D) It can only be created when the form is created

Computer Science & Information Technology

Live File System enables you to do which of the following?

A) make a duplicate copy of one disc to another disc B) copy files to a disc at different times C) copy files between drives D) see the contents of a file on the screen

Computer Science & Information Technology

A(n) ____________________ device is a hardware component that enables a computer to send (transmit) and receive data, instructions, and information to and from one or more computers.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology