Understanding Computers: Today & Tomorrow, Comprehensive 2007 Update EditionGive your students a classic, well-rounded introduction to computer concepts with a modern twist! Important Notice: Media content referenced within the product description or the product text may not be available in the ebook version. |
From inside the book
Results 1-3 of 50
Page 379
... encrypted before they are stored on a hard drive so they will be unreadable if opened by an unauthorized person . Encryption is often implemented using a third - party encryption program , such as Pretty Good Privacy ( PGP ) . How the ...
... encrypted before they are stored on a hard drive so they will be unreadable if opened by an unauthorized person . Encryption is often implemented using a third - party encryption program , such as Pretty Good Privacy ( PGP ) . How the ...
Page 380
... ENCRYPTING A FILE To encrypt a Microsoft Word document , assign a password that will be needed to open the file . To limit who can modify the file , a separate modification password can be assigned . 65 4 3 2 1 1 blue sky assoc File ...
... ENCRYPTING A FILE To encrypt a Microsoft Word document , assign a password that will be needed to open the file . To limit who can modify the file , a separate modification password can be assigned . 65 4 3 2 1 1 blue sky assoc File ...
Page 381
... encryption available ; the stronger the encryption , the more difficult it is to crack . Older 40 - bit encryption ( which can only use keys that are 40 bits or 5 characters long ) is considered weak encryption . Stronger encryption is ...
... encryption available ; the stronger the encryption , the more difficult it is to crack . Older 40 - bit encryption ( which can only use keys that are 40 bits or 5 characters long ) is considered weak encryption . Stronger encryption is ...
Other editions - View all
Common terms and phrases
activities addition allow application software Blah browser cameras Chapter Objective communications connect contain create credit card customers database designed desktop PCs discs discussed disk display document e-commerce e-mail messages Edit View Favorites electronic employees encryption example Favorites Tools Help File Edit View flash memory folder format graphics handheld PCs hard drive hardware identity theft images individuals input installed keyboard located malware Microsoft Internet Explorer monitor movie multimedia operating system options organization password phishing printers processing programming language record RFID screen server shown in Figure smart card software program specific spyware storage stored tablet PC Test types typically users View Favorites Tools Web bugs Web-based Wi-Fi Windows wireless XHTML