________ is the process of scrambling your data or storage devices to make them unreadable by anyone who doesn't have the proper key.
A. Formatting
B. Encryption
C. Virtualization
D. Partitioning
Answer: B
Computer Science & Information Technology
You might also like to view...
Your friend has a Mac that runs OS X. If she needs to run a Windows app on it, she can set it to run Windows also.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
The Animation ________ provides a summary of animation effects used
Fill in the blank(s) with correct word
Computer Science & Information Technology
What two pieces of route information are advertised by distance vector routing protocols to neighbors? (Choose two.)
A) A network topology B) A supported interface list C) A metric D) A next hop device
Computer Science & Information Technology
____________________ charts depict all the tasks along a timeline.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology