________ ensures that information (both stored and in transmitted packets) and programs are changed only in a specified and authorized manner.

A) Data integrity
B) System integrity
C) Accountability
D) Availability


A) Data integrity

Computer Science & Information Technology

You might also like to view...

MC The results of queries commonly are called_________ .

a) query sets. b) result sets. c) record sets. d) Both b and c.

Computer Science & Information Technology

In the code shown here, what is the correct array declaration for the array used in FillArray?

```int FindAverage(float numbers[][25]); int main() { //declarations go here int total; total = FillArray(numbers);``` A. int numbers[25]; B. int numbers[25][25]; C. float numbers[25][25]; D. float numbers[25];

Computer Science & Information Technology

In URL encoded format, each space character is represented by %20.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

City-wide wireless networks are often called ____. City broadband

A. ?City broadband B. ?Muni Wi-Fi C. ?PANs D. ?LANs

Computer Science & Information Technology