The altering of data so that it is not usable unless the changes are undone is:
A) Biometrics
B) Compression
C) Encryption
D) Ergonomics
E) None of the above
Ans: C) Encryption
Computer Science & Information Technology
You might also like to view...
Use the __________ property to configure a maximum width for an element
a. width b. maximum-width c. max-width d. width-max
Computer Science & Information Technology
Under the database approach, data is viewed as proprietary or owned by users.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
Which of the following is NOT an example of a common function argument?
A) text B) definition C) number D) cell reference
Computer Science & Information Technology
____ is a technique used to gain unauthorized access to computers, wherein the attacker assumes or simulates an address that indicate to the victim that the messages are coming from the address of a trusted host.
A. Sniffing B. Spoofing C. Spamming D. DDoS
Computer Science & Information Technology