Text that has been encrypted is called ____.

A. ciphertext
B. plaintext
C. cryptotext
D. cryptography


Answer: A

Computer Science & Information Technology

You might also like to view...

Viewing ____ is helpful if you are not sure how text boxes are linked and how text is flowing in a document.

A. flow threads B. flow lines C. text lines D. text threads

Computer Science & Information Technology

A user can be identified by ________.

a) user knowledge, such as passwords, PINs and lock combinations b) ownership of an item, such as badges, keys and smart cards c) a unique characteristic such as a fingerprint d) all of the above

Computer Science & Information Technology

For each array created, the array name becomes the name of the pointer ____________________ the compiler creates for the array.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Java is a(n) ______.

A. object-oriented programming language B. natural language C. markup language D. low-level language

Computer Science & Information Technology