Which data-hiding technique replaces bits of the host file with other bits of data?

a. Insertion
b. Replacement
c. Substitution
d. Pixelation

ANSWER: c

Computer Science & Information Technology

You might also like to view...

In the context of Prolog programming, a ________________ is a tabular method for visualizing and specifying rules based on multiple factors.

A. selection control structure B. decision table C. formal method D. storyboard

Computer Science & Information Technology

Which of the following phases of web development begins after a website has been designed, developed, and launched??

A. ?Compilation B. ?Maintenance C. ?Debugging D. ?Alpha testing

Computer Science & Information Technology