Information is ________ using a key. In Access, the key will be a password. In other applications, the key can be a separate file
A) decrypted B) secured C) encrypted D) shared
A
Computer Science & Information Technology
A) decrypted B) secured C) encrypted D) shared
A