Content protected from screenshots
Question

What is the typical application of the principle shown in Figure 6.13?