The process of coding information to make it unreadable except to those who have a special piece of information known as a key.
A. encryption
B. security
C. protection
D. restriction
Answer: A
You might also like to view...
The same procedure of copying and pasting objects works for copying and pasting text from one placeholder to another.
Answer the following statement true (T) or false (F)
Case-Based Critical Thinking Questions ? Case 4-2 Mya has just surveyed 100 students to get their reaction to a new textbook she is reviewing. She has one data series that she wants to represent graphically, and she needs to display her data in a way that lets her visually compate the data values and see how much contributes to the whole. ? ? Since it's important for Mya to keep percentages of her whole reviewer base in mind, she wants to represent data as parts of a whole. What chart type would you suggest to Mya? _____
A. bar B. column C. scatter D. pie
Write the statement to declare a three-by-four array of integers with the elements initialized to zero. Name the array myArray.
What will be an ideal response?
An administrator is decommissioning a company's old accounting system and will be sending all the hardware to an off-site recycler. Which of the following is the BEST method for the administrator to ensure no company data will be exposed before sending drives to the recycler?
A. Delete both the files and the folders from the hard drives, and then send them to the recycler B. After logging out and powering down the server, send the drives to the recycler C. Format all drives using the OS, and then send the drives to the recycler D. Physically destroy the drives, and then send the drives to the recycler