_____ is the process of converting readable data into unreadable characters to prevent unauthorized access to the data.

A. Encapsulation
B. Normalization
C. Standardization
D. Encryption


Answer: D

Computer Science & Information Technology

You might also like to view...

Consider the following definition of a recursive method.public static int recFunc(int num){      if (num >= 10)           return 10;      else           return num * recFunc(num + 1);}What is the output of the following statement?System.out.println(recFunc(10));

A. 10 B. 110 C. This statement results in infinite recursion. D. None of these

Computer Science & Information Technology

Showcasing your qualifications is not as important in an application letter as showing how your qualifications match the requirements of the job.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Where are the files stored that contain information for all of the time zones that could be recognized by a Linux operating system?

A. /etc/timezones B. /var/zoneinfo C. /usr/share/zoneinfo D. /var/local/timezones

Computer Science & Information Technology

Which of the following are a good reason for using an array-based implementation of a bag?

a. An array is not fixed size b. You must traverse n entries to get to the nth item in the array c. Requires less memory than a link-based implementation d. Good choice for a large bag

Computer Science & Information Technology