________ is the process of scrambling your data or storage devices to make them unreadable by anyone who doesn't have the proper key.

A. Formatting
B. Encryption
C. Virtualization
D. Partitioning


Answer: B

Computer Science & Information Technology

You might also like to view...

Your friend has a Mac that runs OS X.  If she needs to run a Windows app on it, she can set it to run Windows also.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The Animation ________ provides a summary of animation effects used

Fill in the blank(s) with correct word

Computer Science & Information Technology

What two pieces of route information are advertised by distance vector routing protocols to neighbors? (Choose two.)

A) A network topology B) A supported interface list C) A metric D) A next hop device

Computer Science & Information Technology

____________________ charts depict all the tasks along a timeline.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology