What is attained by keeping unauthorized users from accessing confidential information?

A. Security
B. Integrity
C. Trustworthy
D. Confidentiality


Answer: D

Computer Science & Information Technology

You might also like to view...

The text editor TextEdit comes with Microsoft Windows.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

____________________ are rectangular areas you can position on a page to hold your content, including text and images.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

You can enter color names as ____ values.

A. number B. text C. image D. flash

Computer Science & Information Technology

When headings have been added or changed in a report after the table of contents has been created, click _________ _________ to ensure the latest changes have been included in the table of contents.

A. Change Table B. Modify Table C. Update Table D. Revise Table

Computer Science & Information Technology