Computer security is the use of ____ security techniques to protect data stored on computers.

A. ?physical
B. ?port
C. ?logical
D. ?encrypted


Answer: C

Computer Science & Information Technology

You might also like to view...

Create a comic strip by putting three to four pictures next to each other horizontally and adding text.

This could be done with several methods, but one can also use a single method like the below to put together the image. The point of the question is simply to make a comic strip with JES though. The function will work for three pictures in a row all of the same height.

Computer Science & Information Technology

Beginning with Windows 2003 Server, there are client operating systems included with the distribution.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

_________________________ is an organizational process that identifies potential loss exposures and selects the most appropriate techniques for treating such exposures.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

When referencing elements in an imported schema file, the prefix _____ have to match the prefix used in the imported schema file.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology