_____________ has been defined as ensuring information is accessible only to those authorized to have access and is one of the cornerstones of information security.

A. integrity
B. confidentiality
C. accessibility
D. availability
E. privacy


Answer: B

Computer Science & Information Technology

You might also like to view...

Which type of virtual network should you create if you want a completely isolated test environment for a virtual machine?

A. internal B. external C. VPN D. private

Computer Science & Information Technology

Case-Based Critical Thinking QuestionsCase 2-2You are writing a brief manual on Web page design and you are reviewing the guidelines section you've written. How do you tell readers they can have greater control over the look of the final site, considering that not every font in the font list may be found on every computer?

A. Convert text into an image B. Use integrated fonts C. Use sublimated fonts D. Use fixed font sizes

Computer Science & Information Technology

________ allows you to examine the outcome of the changes to values in a worksheet

Fill in the blank(s) with correct word

Computer Science & Information Technology

It is possible to nest a while loop within the body of a for loop.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology