________ is the process of coding information to make it unreadable except to those who have a special piece of information known as a key.

A. Restriction
B. Encryption
C. Prevention
D. Decryption


Answer: B

Computer Science & Information Technology

You might also like to view...

________ is used to let the sender know that their message is understood

Fill in the blank(s) with correct word

Computer Science & Information Technology

When using the QUARTILE.INC function a quartile of 3 represents which percentile?

A) 50th B) 100th C) 75th D) 25th

Computer Science & Information Technology

Default routes are sometimes called ____ routes.

A. fallback B. break C. network D. quad zero

Computer Science & Information Technology

?Leveling _____.

A. ?uses a series of increasingly detailed data flow diagrams (DFDs) to describe an information system B. ?ensures that the input and output data flows of the parent data flow diagramĀ (DFD) are maintained on the child data flow diagram (DFD) C. ?uses a series of increasingly sketchy data flow diagrams (DFDs) to describe an information system D. ?ensures that the input and output data flows of the child data flow diagram (DFD) are maintained on the parent data flow diagram (DFD)

Computer Science & Information Technology