?If a notebook contains sensitive material, you can __________. 

Fill in the blank(s) with the appropriate word(s).


password-protect some or all of the notebook so that only certain people can open it.

Computer Science & Information Technology

You might also like to view...

What do the initially empty queues queue1and queue2“look like” after thefollowing sequence of operations?Compare these results with Checkpoint Question 2 in Chapter 6.

What will be an ideal response?

Computer Science & Information Technology

What is the purpose of using the null character in a character array?

A. to indicate the end of the data (termination). B. there is no purpose in using the null character in a char array. C. Because null equals 0. D. The null character is mandatory for a clean compile.

Computer Science & Information Technology

Find an equation of a line given the following information. The final answer should be left in slope-intercept form. Passes through the points and

A.
B.
C.
D.
E.

Computer Science & Information Technology

When an organization wants to use encryption, it requests a set of associated public and private keys from a ____.

A. proxy server B. network administrator C. network firewall D. certification authority

Computer Science & Information Technology