Based on the techniques discussed for hiding data on a computer, which method would you use for the following: Hiding information from a young family member who uses the same computer Hiding information from a colleague who is a network administrator Hiding information from an intelligence agency, such as the CIA data hiding techniques : - 1.hide in the properties 2.rename/change extension 3.steganography 4.hash 5.encryption 6.bit shifting .