When using data encryption as a method of protecting data, which of the following is true?

A. It makes few demands on system resources
B. It is usually easily administered
C. It requires careful key Management
D. It should sometimes be used for password files


C. It requires careful key Management

Computer Science & Information Technology

You might also like to view...

Docking and anchoring are easy ways to:

a) allow a form to change sizes without altering the layout too much. b) prevent users from changing the layout of the window. c) prevent a user from resizing the form. d) All of the above

Computer Science & Information Technology

A good way to learn how to use a new application or piece of software is to

a. read the entire manual b. skim through the manual c. call tech support d. click around

Computer Science & Information Technology

A(n) ____________________ includes a series of questions that help you think about the purpose of the workbook and how to achieve your desired results.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

What indicates that a filter has been applied to a column in the Mail Merge Recipients dialog box?

A. An exclamation point appears in the column heading. B. The entire column is shaded light gray. C. There is a grayish-blue arrow in the column heading. D. The column heading is highlighted.

Computer Science & Information Technology