What is attained by keeping unauthorized users from accessing confidential information?
A. Security
B. Integrity
C. Trustworthy
D. Confidentiality
Answer: D
Computer Science & Information Technology
You might also like to view...
The text editor TextEdit comes with Microsoft Windows.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
____________________ are rectangular areas you can position on a page to hold your content, including text and images.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
You can enter color names as ____ values.
A. number B. text C. image D. flash
Computer Science & Information Technology
When headings have been added or changed in a report after the table of contents has been created, click _________ _________ to ensure the latest changes have been included in the table of contents.
A. Change Table B. Modify Table C. Update Table D. Revise Table
Computer Science & Information Technology