____, used in conjunction with business documents, can protect a sensitive business document by controlling usage of that document, such as who can view, print, or copy it.
A. DRM software
B. Copyright statements
C. Copyright notices
D. Digital watermarks
Answer: A
You might also like to view...
The term used for certified 802.11b products is ___________ .
A. WAP B. Wi-Fi C. WEP D. WPA
To sort information, means to list it in a specific sequence such as alphabetically or in numeric order
Indicate whether the statement is true or false
Client/server computing is defined as ____.
A. Two or more computers communicating B. Two or more information systems cooperatively processing to solve a problem C. A database using OLE Object fields D. A database using Web enabling technologies
You should start at the top and move down to the lower subclasses to define the _____.
A. base object B. object literal C. prototype chain D. object constructor