Computer security is the use of ____ security techniques to protect data stored on computers.
A. ?physical
B. ?port
C. ?logical
D. ?encrypted
Answer: C
Computer Science & Information Technology
You might also like to view...
In the variable initialization: char course[20] = “Intro to C++”; the character at course[12] will be:
A. \0 B. a hex value C. + D. a space
Computer Science & Information Technology
Unwanted electronic junk mail about medical products, low-cost loans, and fake software that arrives in your online mailbox is known as ____.
A. junk B. viruses C. spam D. propaganda
Computer Science & Information Technology
A ________ can create a new document based on a preformatted document.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
An injury that results from continuous use of joints in a limited range of motion is called a(n) ____________________ injury.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology