When you ________ your presentation, you are converting the presentation into unreadable scrambled text that only opens with a password

Fill in the blank(s) with correct word


encrypt

Computer Science & Information Technology

You might also like to view...

The Common Criteria defines a common set of security requirements. These requirements are divided into which of the following?

A) Functional requirements and assurance requirements B) Security requirements and physical requirements C) Functional requirements and technical requirements D) Technical requirements and logical requirements

Computer Science & Information Technology

You can define up to ________ columns in each section or page

A) one B) two C) three D) four

Computer Science & Information Technology

What is the benefit of saving a report as another type of file?

What will be an ideal response?

Computer Science & Information Technology

You can apply a template to Photo Album

Indicate whether the statement is true or false

Computer Science & Information Technology