Encryption. Using a secret key, the data is encrypted. To decrypt it, the same or a different key is needed. Unauthorised entities should not have such a key.
Is this a true or false question? If it is let me know and I can help! (:
Answer:
1. The change can be performed in Production, as it is a configuration change.
2. Integration with the ERP system may not function as expected.
Explanation:
Your answer would be B. Media that combines text, images, animation, and sound.
You're welcome:)