?_____ is the process of converting readable data into unreadable characters to prevent unauthorized access to the data.
A. ?Encapsulation
B. ?Normalization
C. ?Standardization
D. ?Encryption
Answer: D
You might also like to view...
Discuss the following approaches to persistence:
(a) Container-Managed Persistence (CMP). (b) Bean-Managed Persistence. (c) JDBC. (d) SQLJ. (e) JDO.
The terms virus and worm actually mean the same thing
Indicate whether the statement is true or false
Critical Thinking Questions Case 1-1 ?Your company recently upgraded to Microsoft Office 2016. Your supervisor has asked you to explain some of the new features in Microsoft Word. You start out with a blank Word document window. Your supervisor wants to know how you would increase or decrease the magnification of the view of a document. What do you tell him to use? a.View arrayc.Magnifier toolb.Display toold.Zoom slider
What will be an ideal response?
Some abbreviation codes are called _____ codes because they use a specific combination of letters that are easy to remember.?
A. ?harmonic B. ?sequence C. ?mnemonic D. ?rhapsodic