A process to hide data by making the file unreadable until the correct password is entered

a. Repair
b. Decrypt
c. Encrypt


C

Computer Science & Information Technology

You might also like to view...

A radio button form control can be set to allow a user to choose only one option or allow for multiple selections.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The way a network is configured is called the _____.

A. ?network orientation B. ?network baseline C. ?network topology D. ?network index

Computer Science & Information Technology

Which of the following resides in active memory and replicates itself over a network to infect machines?

A. ?malware B. a ?virus C. ?a worm D. ?spyware

Computer Science & Information Technology

Rootkits can strike firmware.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology