Match each item with a statement below.

A. Responsible for the storage, maintenance, and protection of the information.
B. Software programs that reveals its designed behavior only when activated.
C. Information remains whole, complete, and uncorrupted.
D. Component in a system that allows the attacker to access the system at will, bypassing standard login controls.
E. Involves operating an information system that meets the high level of availability sought by system users as well as the confidentiality and integrity needs of system owners and security professionals
F. Malicious program that replicates itself constantly.
G. Information is free from mistakes or errors.
H. Responsible for the security and use of a particular set of information.
I. Information is protected from disclosure or exposure to unauthorized individuals or systems.


A. data custodian
B. Trojan horse
C. integrity
D. back door
E. balance
F. worm
G. accuracy
H. data owner
I. confidentiality

Computer Science & Information Technology

You might also like to view...

Match the following computer types with their descriptions:

I. 2-in-1 PC II. All-in-one desktop III. Chromebook IV. Desktop computer V. Embedded computer A. The monitor can fold or swivel to lie flat B. Consists of a separate system unit, monitor, keyboard, and mouse components C. Integrates the system unit into a thin and flat-panel monitor D. A computer chip which has been designed to perform some specific task E. Only uses Google Chrome OS

Computer Science & Information Technology

?Any Internet traffic that is not explicitly permitted into the internal network is denied entry through a firewall.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

?All of the following are computational thinking tools EXCEPT:

A. ?generalization B. ?decomposition C. ?metadata D. ?abstraction

Computer Science & Information Technology

If your hand is on the keyboard, use the Ribbon for formatting.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology