____ is used for encrypting confidential data such as credit card numbers.
A. SLS
B. LSS
C. SSL
D. LLS
Answer: C
Computer Science & Information Technology
You might also like to view...
Data compression
a. can be built into modems b. can occur in separate devices c. differs in effectiveness depending on the data pattern being transmitted d. all of the above
Computer Science & Information Technology
The file into which you insert an object is called the ________ file
A) source B) destination C) object D) linked
Computer Science & Information Technology
The ________ object is highest in the object hierarchy
A) Code B) Application C) Collection D) Statement
Computer Science & Information Technology
_________ is unsolicited contact that you did not ask for and don't want and might come from at attacker
a. Social engineering b. Phishing c. Spamming d. None of the above
Computer Science & Information Technology