________ is the process of altering digital information using an algorithm to make it unreadable to anyone except those who possess the key
A) Encryption
B) Open exclusive
C) Password
D) Selfcert
A
Computer Science & Information Technology
You might also like to view...
Which of the following are created to meet specific needs such as the number of characters entered into a field?
A) Required fields B) Indexed fields C) Permissions Rules D) Custom Input Masks
Computer Science & Information Technology
Which of the following file extensions would you expect to find on a file containing an Excel spreadsheet?
A. .docx B. .xlsx C. .accdb D. .excel
Computer Science & Information Technology