Computer security is the use of ____ security techniques to protect data stored on computers.

A. ?physical
B. ?port
C. ?logical
D. ?encrypted


Answer: C

Computer Science & Information Technology

You might also like to view...

In the variable initialization: char course[20] = “Intro to C++”; the character at course[12] will be:

A. \0 B. a hex value C. + D. a space

Computer Science & Information Technology

Unwanted electronic junk mail about medical products, low-cost loans, and fake software that arrives in your online mailbox is known as ____.

A. junk B. viruses C. spam D. propaganda

Computer Science & Information Technology

A ________ can create a new document based on a preformatted document.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

An injury that results from continuous use of joints in a limited range of motion is called a(n) ____________________ injury.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology