Scrambling and encryption are methods used to prevent ____.

A. piracy
B. hacking
C. malware
D. software bugs


Answer: A

Computer Science & Information Technology

You might also like to view...

CASE STUDY C-2Last night, when Cora used InDesign to design the homepage for her Web site, she liked the idea of it being in black and white. In the harsh glare of the morning sunshine, however, she decides that she had better add some color or suffer having the weakest Web page in school. Cora's first order of business is to jazz up the letters in her banner. She decides to outline them with a fine yellow line. Which of the following terms is most appropriate for her plan?

A. fill B. border C. stroke D. outline

Computer Science & Information Technology

Exposure of a photo refers to the intensity of colors

Indicate whether the statement is true or false

Computer Science & Information Technology

Match the PowerPoint 2010 feature with the group where they are located:

I. SmartArt A. Text group II. Convert to SmartArt Graphic B. Paragraph group III. WordArt C. Illustrations group IV. Color D. Arrange group V. Rotate E. Adjust group

Computer Science & Information Technology

You should avoid using a(n) ____________________ as the first character in ID names.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology