__________ assures that individuals control or influence what information related to them may be collected and stored and by whom and to whom that information may be disclosed.

A. Availability B. System Integrity

C. Privacy D. Data Integrity


C. Privacy

Computer Science & Information Technology

You might also like to view...

What can be used in conjunction with manual audits to provide a faster means to evaluate programs?

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

1. A function call is a valid statement 2. A user-defined function can call library functions or user-defined functions 3. An actual output argument must be of the same pointer data type as the corresponding formal parameter. 4. Insertion of stubs is a part of top-down testing 5. An expression cannot be used as an actual argument in a call to a function.

Computer Science & Information Technology

If you see a /16 in the header of a snort rule, what does it mean?

A. a maximum of 16 log entries should be kept B. the size of the log file is 16 MB C. the subnet mask is 255.255.0.0 D. the detected signature is 16 bits in length

Computer Science & Information Technology

To center a page horizontally, use the Margins tab in the ________ dialog box

A) Sheet Options B) Orientation C) Print Area D) Page Setup

Computer Science & Information Technology