Data may be hidden by all of the following methods EXCEPT

A) Renaming to a common name used by the operating system
B) Using special characters in the actual name
C) Encrypting the file
D) Password-protecting the file


B

Computer Science & Information Technology

You might also like to view...

Which of the following is not a comparison operator which can be used in an IF function?

A) > B) <> C) => D) <

Computer Science & Information Technology

A folder created inside another folder is called a(n) ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

What is the purpose of a logical address?

What will be an ideal response?

Computer Science & Information Technology

A set of controls grouped together in a form or report that allows manipulation of the set of controls as a single control is a(n) ____________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology