Bypassing the digital rights manager software to remove the barrier of not being allowed to run application programs not authorized by the phone's manufacturer is called ________

A) frequency-shift keying B) amplifying
C) jail-breaking D) locking

C

Computer Science & Information Technology

You might also like to view...

A(n) ________ is comprised of unique character combinations that perform mathematical operations

Fill in the blank(s) with correct word

Computer Science & Information Technology

TCP is an acronym for_______.

a) Transport Control Protocol. b) Transfer Control Protocol. c) Transportation Comptroller Protocol. d) None of the above.

Computer Science & Information Technology