Encryption is more than simple password protection; it prevents users from ________

A) opening the file B) editing the file C) saving the file D) deleting the file


A

Computer Science & Information Technology

You might also like to view...

The audio subsystem consists of the speakers and a(n) ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

To modify a grouped object, you must enter group-editing mode.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which is an advantage of using an integrated development environment (IDE) tool?

A. It is highly effective because it is built into the vendor’s software package. B. It is a simple tooland does not require skills that are readily transferrable. C. It requires less memory and processing power. D. It eliminates efficiency or performance problems in an application.

Computer Science & Information Technology

A web bug can do all of the following EXCEPT:

A. ?identify your IP address B. ?identify the last website you visited C. ?identify other bugs on the website D. ?identify your use of the web site containing the web bug

Computer Science & Information Technology