To ____ a file is to modify it to make the information unreadable to unauthorized people.

A. hide
B. customize
C. digitize
D. encrypt


Answer: D

Computer Science & Information Technology

You might also like to view...

Explain why it is important to set a realistic perimeter for the personnel security boundaries.

What will be an ideal response?

Computer Science & Information Technology

What type of agreement is used when entering into a long negotiation of services when multiple contracts or agreements might be needed?

a. Service level agreement b. MSDS sheets c. Statement of work d. Master service agreement

Computer Science & Information Technology

When using the Tab Order option, you need to set the TabIndex values in numerical order, beginning with the number 1.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A(n) ________ displays the name of a screen element, button, or area on a window

Fill in the blank(s) with correct word

Computer Science & Information Technology