Which data-hiding technique places data from the secret file into the host file without displaying the secret data when the host file is viewed in its associated program?

a. Replacement
b. Pixelation
c. Substitution
d. Insertion


ANSWER: d

Computer Science & Information Technology

You might also like to view...

Which of the following features are available in Windows 7 Professional beyond those available in Windows 7 Home Premium?

A. HomeGroup B. Windows XP Mode C. Aero Desktop D. Internet Explorer 8

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

1. A Boolean variable can only store the two values true or false. 2. To assign a value to a variable during run-time, drag the variable tile and drop it into the method editor where you want the set statement to be executed. 3. The ask user functions are used to get input from the user. 4. String addition is used to join two strings together. 5. Local variables are created in the local area of the Method Editor.

Computer Science & Information Technology

File ____ describe(s) file characteristics such as name, type, location, and size.

A. Explorer B. names C. properties D. extensions

Computer Science & Information Technology

Which of the following calculations cannot be completed with subtotal?

A) Standard Deviation B) Average C) Sum D) Max

Computer Science & Information Technology