The process of making and using codes to secure information is known as __________.
Fill in the blank(s) with the appropriate word(s).
cryptography
Computer Science & Information Technology
You might also like to view...
You can add a(n) ________ to your presentation that will allow you to go directly to another file, location in a file, or a Web page
A) linked file B) hyperlink C) animation D) embedded object
Computer Science & Information Technology
Since a page designer doesn't know the exact properties of a user's device, the common practice is to make the text _________ with all font sizes expressed relative to a default font size.?
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology