________ is the act of assigning a secret code to a file so that only those who know the code can open the file
Fill in the blank(s) with correct word
Password-protect
Computer Science & Information Technology
You might also like to view...
The signal components that occur as bands above and below a carrier are called
a. sidebands. b. sine waves. c. frequency translators. d. modulating frequencies.
Computer Science & Information Technology
You can use a(n) ________ object to delay the performance of an action.
a. DelayedAction b. ActionHandler c. TaskHandler d. Handler
Computer Science & Information Technology