To protect data so it cannot be easily read, what technology is used?
A) Authentication
B) Encryption
C) Authorization
D) Firewalling
B
Computer Science & Information Technology
You might also like to view...
The __________ namespace contains stream classes such as StreamWriter and StreamReader.
a) System.IO b) System.ReadWrite c) System.InputOutput d) System.
Computer Science & Information Technology
It is important to document your cable patching using some form of of the following?
What will be an ideal response?
Computer Science & Information Technology
Four bits form a byte.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
The use of macros results in the efficient and accurate processing of the database from one ________ location
Fill in the blank(s) with correct word
Computer Science & Information Technology