________ ensures that a user may make multiple uses of resources or services without others being able to link these uses together.

A. Anonymity B. Pseudonymity

C. Unobservability D. Unlinkability


D. Unlinkability

Computer Science & Information Technology

You might also like to view...

Notebook computers typically cost between ____ and US$4,000.

A. US$200 B. US$300 C. US$750 D. US$1,000

Computer Science & Information Technology

Which of the following is TRUE about the Recent Documents list in Office 2013?

A) It constantly changes. B) It is accessed from the Home tab. C) All files located on your hard drive can be accessed from it. D) It can be quickly accessed with the F10 key.

Computer Science & Information Technology

Although you can use the Draw Table feature to create new rows, sometimes it is faster to use the ________ feature

Fill in the blank(s) with correct word

Computer Science & Information Technology

Assume that the current directory is C:\ and a file named MESSAGE.BAT is located in the C:\Util directory. Which one of the following commands would be effective?

A) ERASE MESSAGE.BAT B) COPY MESSAGE.BAT \UTIL C) TYPE C:\UTIL\MESSAGE.BAT D) COPY C:\MESSAGE.BAT C:\UTIL\MESSAGE.BAT

Computer Science & Information Technology