The process of making and using codes to secure information is known as __________.

Fill in the blank(s) with the appropriate word(s).

cryptography

Computer Science & Information Technology

You might also like to view...

You can add a(n) ________ to your presentation that will allow you to go directly to another file, location in a file, or a Web page

A) linked file B) hyperlink C) animation D) embedded object

Computer Science & Information Technology

Since a page designer doesn't know the exact properties of a user's device, the common practice is to make the text _________ with all font sizes expressed relative to a default font size.?

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology