____ is the process of altering readable data(plain text) into an unreadable form

A. Encryption
B. Decryption
C. Biometrics
D. Rootkit

Answer: A. Encryption

Computer Science & Information Technology

You might also like to view...

Webcasts are only delivered as prerecorded audio and video content

Indicate whether the statement is true or false

Computer Science & Information Technology

An overloaded method is one that ________.

a. has a different name than another method, but the same parameters b. has the same name as another method, but different parameters (by number, types or order of the types) c. has the same name and parameters as a method defined in another class d. has the same name and parameters, but a different return type as another method

Computer Science & Information Technology