________ is the act of assigning a secret code to a file so that only those who know the code can open the file

Fill in the blank(s) with correct word

Password-protect

Computer Science & Information Technology

You might also like to view...

The signal components that occur as bands above and below a carrier are called

a. sidebands. b. sine waves. c. frequency translators. d. modulating frequencies.

Computer Science & Information Technology

You can use a(n) ________ object to delay the performance of an action.

a. DelayedAction b. ActionHandler c. TaskHandler d. Handler

Computer Science & Information Technology