Encryption utilities scramble the data in a file by using a _____ key.
A. password
B. multi-digit
C. 10-digit
D. compression
Answer: B
Computer Science & Information Technology
You might also like to view...
____________________ are the lines that separate one cell from another.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
Formatting the values and overall appearance of a PivotTable is done by opening the ________ dialog box for a field
Fill in the blank(s) with correct word
Computer Science & Information Technology
Perform the following additions on 4?bit negabinary numbers. The result is a 6?bit negabinary value.
a. 0000 +0001 b. 1010 +0101 c. 1101 +1011 d. 1111 +1111
Computer Science & Information Technology
A file in which each column contains a specific number of characters.
What will be an ideal response?
Computer Science & Information Technology