Protecting student grade information from being disclosed to other students is an example of which of the CIA triad?

What will be an ideal response?


Confidentiality

Computer Science & Information Technology

You might also like to view...

The doInOrder and doTogetherstatements are control structures.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Answer the following questions true (T) or false (F)

1. The purpose of the address tag is to contain the e-mail address for contacting the document’s maintainer as well as the date that the document was last modified. 2. HTML is case sensitive.

Computer Science & Information Technology

Using Microsoft Reports, you can print and display ____________________ reports over the Internet.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A single file containing a series of individual images that creates simple animation is known as a(n) ____.

A. embedded object B. standard JPEG C. animated GIF D. Flash animation

Computer Science & Information Technology