________ is trustworthiness of data or resources in the prevention of improper and unauthorized changes—the assurance that information is sufficiently accurate for its purpose.

A. Confidentiality
B. Availability
C. Authenticity
D. Integrity


Answer: D. Integrity

Computer Science & Information Technology

You might also like to view...

Chris has inherited the management of some highly disorganized projects from her predecessor. One of its hallmarks is that the projects included a lot of constraints that have proven unnecessary, and which have complicated the reporting on the projects and the accurate assessment of where things stand. Because you were privy to a lot of the background about the projects, Chris has asked you to help her sort it all out.For another project Chris is now managing, the project is scheduled from a Finish date of May 13, 2009 and a Start date of January 5 was entered into the Entry table for one of the tasks. What constraint type do you tell Chris was automatically applied to that task?

A. Start No Later Than B. Start No Earlier Than C. Finish No Earlier Than D. Finish No Later Than

Computer Science & Information Technology

Any address returned by ____ can be used subsequently by ____ to restore reserved memory back to the computer

a. new, delete b. delete, new c. *, reset d. peek, poke

Computer Science & Information Technology

You can add and delete commands on the Quick Access Toolbar

Indicate whether the statement is true or false

Computer Science & Information Technology

The Array class's last method can be used to retrieve the first or last item from an array.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology