Text that has been encrypted is called ____.
A. ciphertext
B. plaintext
C. cryptotext
D. cryptography
Answer: A
You might also like to view...
Viewing ____ is helpful if you are not sure how text boxes are linked and how text is flowing in a document.
A. flow threads B. flow lines C. text lines D. text threads
A user can be identified by ________.
a) user knowledge, such as passwords, PINs and lock combinations b) ownership of an item, such as badges, keys and smart cards c) a unique characteristic such as a fingerprint d) all of the above
For each array created, the array name becomes the name of the pointer ____________________ the compiler creates for the array.
Fill in the blank(s) with the appropriate word(s).
Java is a(n) ______.
A. object-oriented programming language B. natural language C. markup language D. low-level language