A loss of __________ is the unauthorized disclosure of information.

A) authenticity
B) confidentiality
C) reliability
D) integrity


B) confidentiality

Computer Science & Information Technology

You might also like to view...

In other object-oriented programming languages, like Java, the base class is called the ___________ and the derived class is the ________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The BIOS/UEFI setup password can be reset by simply removing the battery for several minutes

Indicate whether the statement is true or false

Computer Science & Information Technology

The only terrorist who stood trial for the atrocities of September 11, 2001, was Zacharias Moussaoui

Indicate whether the statement is true or false.

Computer Science & Information Technology

Case-Based Critical Thinking Question ? John wants to add related text to images on his Lawn Care business website. John also finds out that he can nest an img element inside a(n) ____ element to align it horizontally.

A. div B. block-level C. span D. alignment

Computer Science & Information Technology