Encrypted data is called ______
a. ciphertext
b. cybersquatting
c. symmetric-key
d. shopping cart
a. ciphertext
Computer Science & Information Technology
You might also like to view...
An implementation of the _________ interface configures the database connection and prepares query statements automatically.
a. ResultSet b. RowSet c. Both of the above d. Neither of the above
Computer Science & Information Technology
Global groups can have domain local groups as members. True or False?
a. true b. false
Computer Science & Information Technology