Hashing algorithms are used to address which of the following?
A. Confidentiality
B. Compatibility
C. Availability
D. Integrity
Answer: D. Integrity
Computer Science & Information Technology
You might also like to view...
LISP uses a notation known as ______.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
A(n) ________ is an interactive graphical representation of the data in a PivotTable
Fill in the blank(s) with correct word
Computer Science & Information Technology
____ allows a user the ability to remotely connect to the database to retrieve information as a user different from that defined by the Web technology.
A. NEWUSER B. OPENUSER C. REMOTEDIAL D. OPENROWSET
Computer Science & Information Technology
If you have a phishing incident from someone pretending to be your bank, you should report it to
A) Your bank and CERT B) The FBI C) The local police and the FBI D) The SIIA and BSA
Computer Science & Information Technology