________ is a method applied to data to reduce the amount of storage space
Fill in the blank(s) with correct word
Compression
Computer Science & Information Technology
You might also like to view...
A group of related fields is called a ________
A) record B) table C) query D) hyperlink
Computer Science & Information Technology
Attacks that are launched from multiple zombie computers at the same time are called ________
A) Trojan horses B) distributed denial-of-service attacks (DDoS) C) worms D) script kiddies
Computer Science & Information Technology