What is the name of the code that is used to store characters?
What will be an ideal response?
ASCII (OR: EBCDIC)
Computer Science & Information Technology
You might also like to view...
When applying a sort, the default order is ________
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
Match the following security terms on the left with the definitions on the right
1. Confidentiality a. the base security configuration selected by an organization 2. Integrity b. the practice of using multiple layers of security between data and the resources on which it resides and possible attackers 3. Availability c. ensuring that data is accessible when and where it is needed 4. Default stance d. prevents the disclosure of data or information to unauthorized entities 5. Defense in depth e. ensures that data is protected from unauthorized modification or data corruption
Computer Science & Information Technology