____ is the process of altering readable data(plain text) into an unreadable form
A. Encryption
B. Decryption
C. Biometrics
D. Rootkit
Answer: A. Encryption
Computer Science & Information Technology
You might also like to view...
Webcasts are only delivered as prerecorded audio and video content
Indicate whether the statement is true or false
Computer Science & Information Technology
An overloaded method is one that ________.
a. has a different name than another method, but the same parameters b. has the same name as another method, but different parameters (by number, types or order of the types) c. has the same name and parameters as a method defined in another class d. has the same name and parameters, but a different return type as another method
Computer Science & Information Technology