COGNITIVE ASSESSMENT
You want to help ensure that unauthorized people will not be able to view the files on a given medium. Which of the following will you use?

A. encryption
B. embedding
C. concatentation
D. file linking


Answer: A

Computer Science & Information Technology

You might also like to view...

How does a latency optimization scheme operate?

What will be an ideal response?

Computer Science & Information Technology

trace the execution for a binary search, searching for the number 235.

Given the sorted list: 1 7 8 9 56 90 123 235 653

Computer Science & Information Technology

How many bits does it take to spell the word yes?

A) 3 B) 8 C) 24 D) 30

Computer Science & Information Technology

The Alignment group on the Layout tab includes features that allow you to change all of the following except for what?

A) Rotating the text B) Vertical alignment C) Reversing the text D) Horizontal alignment

Computer Science & Information Technology