To ____ a file is to modify it to make the information unreadable to unauthorized people.
A. hide
B. customize
C. digitize
D. encrypt
Answer: D
Computer Science & Information Technology
You might also like to view...
Explain why it is important to set a realistic perimeter for the personnel security boundaries.
What will be an ideal response?
Computer Science & Information Technology
What type of agreement is used when entering into a long negotiation of services when multiple contracts or agreements might be needed?
a. Service level agreement b. MSDS sheets c. Statement of work d. Master service agreement
Computer Science & Information Technology
When using the Tab Order option, you need to set the TabIndex values in numerical order, beginning with the number 1.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
A(n) ________ displays the name of a screen element, button, or area on a window
Fill in the blank(s) with correct word
Computer Science & Information Technology