________ is the process of changing text-based information into a state in which a key is required in order to read the information

A) Decryption B) Shared access C) Encryption D) Exclusive access

C

Computer Science & Information Technology

You might also like to view...

An encrypted file cannot be opened without a password

Indicate whether the statement is true or false

Computer Science & Information Technology

Computers often perform ____ tasks.

A. repetitive B. illegal C. misdirected D. encrypted

Computer Science & Information Technology