____ technologies require users to log in with a valid user ID and password to access web-based content.

A. Encryption
B. Copy protection
C. Digital watermark
D. Authentication


Answer: D

Computer Science & Information Technology

You might also like to view...

____________________ are used to enter data for processing.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Once you create a SmartArt graphic, you can modify its style just as you can with any object.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A field in an Access database table that has no value is determined by Access to have a ____ value.

A. custom B. zero C. null D. number

Computer Science & Information Technology

Worldwide, the ICT industry directly employs about _____ of the total workforce in jobs such as computer manufacturing, programming, and data security.

A. 4% B. 14% C. 24% D. 40%

Computer Science & Information Technology