When a file is converted back to its original form, it is said to be:

A) decrypted B) encrypted C) scripted D) coded


A

Computer Science & Information Technology

You might also like to view...

Facebook is the ________ most popular site for job hunters and for employers seeking to fill new positions

A) first B) second C) third D) fourth

Computer Science & Information Technology

List four benefits of either replacing the campus or corporate routers with layer 3 switches or adding layer 3 switching to a router-less network.

What will be an ideal response?

Computer Science & Information Technology

What predefined option within DHCP may be necessary for some configurations of Windows Deployment Server?

A. 044 WINS/NBNS Servers B. 046 WINS/NBT Node type C. 080 WDS config D. 060 PXEClient

Computer Science & Information Technology

?A 'virus signature' contains the email ID of the virus developer.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology