A process to hide data by making the file unreadable until the correct password is entered
a. Repair
b. Decrypt
c. Encrypt
C
Computer Science & Information Technology
You might also like to view...
A radio button form control can be set to allow a user to choose only one option or allow for multiple selections.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
The way a network is configured is called the _____.
A. ?network orientation B. ?network baseline C. ?network topology D. ?network index
Computer Science & Information Technology
Which of the following resides in active memory and replicates itself over a network to infect machines?
A. ?malware B. a ?virus C. ?a worm D. ?spyware
Computer Science & Information Technology
Rootkits can strike firmware.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology