In addition to being a copyright concern, ____ can be used to misquote individuals, repeat comments out of context, retouch photographs-even create false or misleading photographs.

A. digital counterfeiting
B. identity theft
C. plagiarism
D. digital manipulation


Answer: D

Computer Science & Information Technology

You might also like to view...

_________ defines a number of techniques for key management.

A) KEP B) KMP C) SKE D) IKE

Computer Science & Information Technology

?In a sequence diagram, a _____ is identified by a line showing direction that runs between two objects.

A. ?message B. ?procedure C. ?method D. ?response

Computer Science & Information Technology

When using Ogg, a common audio encoding  is ____ audio.

A. Opus B. AAC C. Theora D. H.264

Computer Science & Information Technology

The Windows ____ utility can identify temporary Internet files and other others that can be safely removed.

A. Disk Defragmentation B. Firewall C. Disk Cleanup D. Defender

Computer Science & Information Technology