When you ________ your presentation, you are converting the presentation into unreadable scrambled text that only opens with a password
Fill in the blank(s) with correct word
encrypt
Computer Science & Information Technology
You might also like to view...
The Common Criteria defines a common set of security requirements. These requirements are divided into which of the following?
A) Functional requirements and assurance requirements B) Security requirements and physical requirements C) Functional requirements and technical requirements D) Technical requirements and logical requirements
Computer Science & Information Technology
You can define up to ________ columns in each section or page
A) one B) two C) three D) four
Computer Science & Information Technology
What is the benefit of saving a report as another type of file?
What will be an ideal response?
Computer Science & Information Technology
You can apply a template to Photo Album
Indicate whether the statement is true or false
Computer Science & Information Technology