Answer: Yes
Explanation: One should not be able to just find negative information on someone just because they googled it (unless they're famous of course)
Answer: C. File encryption
Explanation: To ensure security and privacy of files and its content, encrypting the file may be an option. File encryption refers to a process of ensuring the security and privacy of individual files so as to prevent unauthorized access to the content. File encryption works by setting up a security key which will be requested or needed when the file is being clicked such that only users or individuals with the authorized pass code or password can open and read its content or modify the file, this is called file decryption.
Answer:
The author will know where data will be inserted in the document.
Explanation:
A method of taking data from a database, spreadsheet, or other form of structured data, and inserting it into documents such as letters, envelopes and/or mailing labels.
Answer:the first IP when the traceroute is started is our IP. It is our private IP which is displayed because it is the first hop for the tracing of the route. Hence, our IP is shown in the first statement.
Explanation: