To keep information beyond reach of unauthorized users is to keep the information _____.

A. secure
B. economical
C. simple
D. verifiable


Answer: A

Computer Science & Information Technology

You might also like to view...

An entity is a characteristic of an attribute

Indicate whether the statement is true or false

Computer Science & Information Technology

________ is used to create a backup of notebooks in OneNote

Fill in the blank(s) with correct word

Computer Science & Information Technology

What is the difference between a simple volume and a spanned volume?

What will be an ideal response?

Computer Science & Information Technology

The SSID can be easily discovered even when it is not contained in beacon frames.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology