Encrypted data is called ______

a. ciphertext
b. cybersquatting
c. symmetric-key
d. shopping cart

a. ciphertext

Computer Science & Information Technology

You might also like to view...

An implementation of the _________ interface configures the database connection and prepares query statements automatically.

a. ResultSet b. RowSet c. Both of the above d. Neither of the above

Computer Science & Information Technology

Global groups can have domain local groups as members. True or False?

a. true b. false

Computer Science & Information Technology