Which data-hiding technique replaces bits of the host file with other bits of data?
a. Insertion
b. Replacement
c. Substitution
d. Pixelation
ANSWER: c
Computer Science & Information Technology
You might also like to view...
In the context of Prolog programming, a ________________ is a tabular method for visualizing and specifying rules based on multiple factors.
A. selection control structure B. decision table C. formal method D. storyboard
Computer Science & Information Technology
Which of the following phases of web development begins after a website has been designed, developed, and launched??
A. ?Compilation B. ?Maintenance C. ?Debugging D. ?Alpha testing
Computer Science & Information Technology