____, used in conjunction with business documents, can protect a sensitive business document by controlling usage of that document, such as who can view, print, or copy it.

A. DRM software
B. Copyright statements
C. Copyright notices
D. Digital watermarks


Answer: A

Computer Science & Information Technology

You might also like to view...

The term used for certified 802.11b products is ___________ .

A. WAP B. Wi-Fi C. WEP D. WPA

Computer Science & Information Technology

To sort information, means to list it in a specific sequence such as alphabetically or in numeric order

Indicate whether the statement is true or false

Computer Science & Information Technology

Client/server computing is defined as ____.

A. Two or more computers communicating B. Two or more information systems cooperatively processing to solve a problem C. A database using OLE Object fields D. A database using Web enabling technologies

Computer Science & Information Technology

You should start at the top and move down to the lower subclasses to define the _____.

A. base object B. object literal C. prototype chain D. object constructor

Computer Science & Information Technology