Securing the contents of an e-mail or file by scrambling its contents is called:

A) decryption B) permissions C) encryption D) hiding

C

Computer Science & Information Technology

You might also like to view...

Which of the following happens when you insert a new row into a worksheet?

A. ?The new row is added at the end of the sheet. B. ?The new row is added at the beginning of the sheet. C. ?The new row is added and the remaining rows shift down to accommodate it. D. ?The new row is added and the remaining rows shift up to accommodate it.

Computer Science & Information Technology

Which of the following is not an example of identifying protocols that are needed to support hardware and software requirements of applications that will use the network?

a. an application will use HTTP over TCP/IP b. an application will run on an IBM mainframe and so the network will require SNA traffic c. an application will need a gateway to translate SNA traffic into TCP/IP protocols d. an application will use SPX/IPX with a Novell file server e. an application will have drop down menu choices

Computer Science & Information Technology