____ is used for encrypting confidential data such as credit card numbers.

A. SLS
B. LSS
C. SSL
D. LLS


Answer: C

Computer Science & Information Technology

You might also like to view...

Data compression

a. can be built into modems b. can occur in separate devices c. differs in effectiveness depending on the data pattern being transmitted d. all of the above

Computer Science & Information Technology

The file into which you insert an object is called the ________ file

A) source B) destination C) object D) linked

Computer Science & Information Technology

The ________ object is highest in the object hierarchy

A) Code B) Application C) Collection D) Statement

Computer Science & Information Technology

_________ is unsolicited contact that you did not ask for and don't want and might come from at attacker

a. Social engineering b. Phishing c. Spamming d. None of the above

Computer Science & Information Technology