____ is a fascinating and possibly dangerous technique for hiding one form of information inside another.

A. Sociology
B. Cryptography
C. Steganography
D. Social analytics


Answer: C

Computer Science & Information Technology

You might also like to view...

WebClient’s ________ method terminates its executing asynchronous task.

a) TerminatePendingRequests b) CancelPendingRequests c) DeletePendingRequests d) RemovePendingRequests

Computer Science & Information Technology

Which operation is not efficiently supported by priority queues?

a. deleteMin b. find c. findMin d. insert e. All of the above are efficiently supported

Computer Science & Information Technology

To italicize selected text the user can use the ________ shortcut key

A) Ctrl+i B) Ctrl+a C) Ctrl+u D) Ctrl+b

Computer Science & Information Technology

Which of the following describes fiber-optic broadband?

a. It uses strands of pure glass or plastic. b. It connects via an orbiting satellite. c. It connects with coaxial cable. d. Speed drops as the distance from the main signal source increases.

Computer Science & Information Technology