The process of altering digital information using an algorithm to make it unreadable to anyone except those who possess the password.

What will be an ideal response?


Encryption

Computer Science & Information Technology

You might also like to view...

Generics make writing a program more __________.

a) elegant b) cumbersome c) concise d) a and c

Computer Science & Information Technology

The Network Time Protocol service can be used to synchronize computer clocks. Explain why, even with this service, no guaranteed bound given for the difference between two clocks.

What will be an ideal response?

Computer Science & Information Technology

Access creates macros automatically when you add certain controls to forms or reports

Indicate whether the statement is true or false

Computer Science & Information Technology

Give two ways to change a document from a portrait orientation to landscape. Identify at least one document type that you think would be better suited for landscape orientation rather than portrait

What will be an ideal response?

Computer Science & Information Technology