Protecting student grade information from being disclosed to other students is an example of which of the CIA triad?
What will be an ideal response?
Confidentiality
Computer Science & Information Technology
You might also like to view...
The doInOrder and doTogetherstatements are control structures.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
Answer the following questions true (T) or false (F)
1. The purpose of the address tag is to contain the e-mail address for contacting the document’s maintainer as well as the date that the document was last modified. 2. HTML is case sensitive.
Computer Science & Information Technology
Using Microsoft Reports, you can print and display ____________________ reports over the Internet.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
A single file containing a series of individual images that creates simple animation is known as a(n) ____.
A. embedded object B. standard JPEG C. animated GIF D. Flash animation
Computer Science & Information Technology