COGNITIVE ASSESSMENT
You want to help ensure that unauthorized people will not be able to view the files on a given medium. Which of the following will you use?
A. encryption
B. embedding
C. concatentation
D. file linking
Answer: A
Computer Science & Information Technology
You might also like to view...
How does a latency optimization scheme operate?
What will be an ideal response?
Computer Science & Information Technology
trace the execution for a binary search, searching for the number 235.
Given the sorted list: 1 7 8 9 56 90 123 235 653
Computer Science & Information Technology
How many bits does it take to spell the word yes?
A) 3 B) 8 C) 24 D) 30
Computer Science & Information Technology
The Alignment group on the Layout tab includes features that allow you to change all of the following except for what?
A) Rotating the text B) Vertical alignment C) Reversing the text D) Horizontal alignment
Computer Science & Information Technology