Data may be hidden by all of the following methods EXCEPT
A) Renaming to a common name used by the operating system
B) Using special characters in the actual name
C) Encrypting the file
D) Password-protecting the file
B
Computer Science & Information Technology
You might also like to view...
Which of the following is not a comparison operator which can be used in an IF function?
A) > B) <> C) => D) <
Computer Science & Information Technology
A folder created inside another folder is called a(n) ________
Fill in the blank(s) with correct word
Computer Science & Information Technology
What is the purpose of a logical address?
What will be an ideal response?
Computer Science & Information Technology
A set of controls grouped together in a form or report that allows manipulation of the set of controls as a single control is a(n) ____________________.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology