Access control is intended to guard the ____ of information by making it accessible only to authorized users.
A. confidentiality
B. availability
C. integrity
D. non-repudiation
Answer: B
Computer Science & Information Technology
You might also like to view...
Speaker notes can be keyed in the _____.
A. notes pane B. notes page C. both a and b D. neither a nor b
Computer Science & Information Technology
__________________ will cause an object not to display
a. display: block; b. display: 0px; c. display: none; d. display: fixed;
Computer Science & Information Technology
Multiple objects connected so they move as though they are a single object.
What will be an ideal response?
Computer Science & Information Technology
The proportion of noise to the strength of a signal is called the _________________.?
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology