________ is the act of assigning a secret code to a file so that only those who know the code can open the file

Fill in the blank(s) with correct word


Password-protect

Computer Science & Information Technology

You might also like to view...

Rewrite the following conditional expressions without any NOT operators so that the logical outcome is unchanged for all values of the variable x. Then evaluate the original expression and the equivalent expression using the values: x = 1, y = 1, z = 1. Compare the results.

Notes: The NOT operator applies to the part of the expression enclosed in parentheses that follows immediately. Evaluating the original and equivalent expressions for the values given is only a partial check. A general check can be done with a truth table. NOT (x = 1) AND NOT (x = 2) (x<>1)AND(x<>2)

Computer Science & Information Technology

A monochromatic color scheme is ___________________.

a. no color at all b. a single hue of color c. all of the above d. none of the above

Computer Science & Information Technology

What is the last line of the output when the following code is executed? x = 2for exp in range (5): print ("%2d.0" % x**exp)

A. 8.0 B. 16 C. 32 D. 16.0

Computer Science & Information Technology

____ control the transfer of information between the disk drives and the rest of the computer system.

A. System controllers B. Disk drive controllers C. System interfaces D. Disk drive interfaces

Computer Science & Information Technology