Access control is intended to guard the ____ of information by making it accessible only to authorized users.

A. confidentiality
B. availability
C. integrity
D. non-repudiation


Answer: B

Computer Science & Information Technology

You might also like to view...

Speaker notes can be keyed in the _____.

A. notes pane B. notes page C. both a and b D. neither a nor b

Computer Science & Information Technology

__________________ will cause an object not to display

a. display: block; b. display: 0px; c. display: none; d. display: fixed;

Computer Science & Information Technology

Multiple objects connected so they move as though they are a single object.

What will be an ideal response?

Computer Science & Information Technology

The proportion of noise to the strength of a signal is called the _________________.?

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology