The altering of data so that it is not usable unless the changes are undone is:

A) Biometrics
B) Compression
C) Encryption
D) Ergonomics
E) None of the above


Ans: C) Encryption

Computer Science & Information Technology

You might also like to view...

Use the __________ property to configure a maximum width for an element

a. width b. maximum-width c. max-width d. width-max

Computer Science & Information Technology

Under the database approach, data is viewed as proprietary or owned by users.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which of the following is NOT an example of a common function argument?

A) text B) definition C) number D) cell reference

Computer Science & Information Technology

____ is a technique used to gain unauthorized access to computers, wherein the attacker assumes or simulates an address that indicate to the victim that the messages are coming from the address of a trusted host.

A. Sniffing B. Spoofing C. Spamming D. DDoS

Computer Science & Information Technology