FTP is secured by requiring usernames and passwords and _________

a. Smart cards
b. Biometric scanning
c. Encryption of transmissions
d. Voice recognition

C.

Computer Science & Information Technology

You might also like to view...

The following algorithm represents the ____.Function Numeric unKnown(Numeric x, Numeric y)   If y = 0 Then      Return x   Else      Return GCD(y, x % y)   End IfEnd Function

A. sum of squares B. Fibonacci series C. GCD function D. factorial series

Computer Science & Information Technology

The _________________________ contains commands related to changing the appearance of text in a document.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology