_____ ensures that authorized users have timely and reliable access to necessary information.

A. Availability
B. Integrity
C. Confidentiality
D. Concealability


Answer: A

Computer Science & Information Technology

You might also like to view...

A UML diagram does not contain __________.

a. the class name b. the method names c. the field names d. the object names

Computer Science & Information Technology

Discuss how XML can be transferred into a database.

What will be an ideal response?

Computer Science & Information Technology

In ________, Website developers had the ability to provide a link to a graphic file, but the user would need to save the file and then open it separately to view it

A) Web 2.0 B) Web 1.0 C) Web 3.0 D) This is not applicable to any of the Web technologies.

Computer Science & Information Technology

How can you tell the difference between a bit and a byte when a particular capacity is shown like 6 GB?

A) You have to see the word in context. B) When the capacity has no B after it, then bits are to be assumed. C) A lowercase b denotes bits; uppercase means bytes. D) Where PCs are concerned, bytes are always used.

Computer Science & Information Technology