Which of the following refers to the unauthorized or unintentional modification or destruction of information?
A) Loss of availability
B) Loss of confidentiality
C) Loss of control
D) Loss of integrity
D) Loss of integrity
Computer Science & Information Technology
You might also like to view...
For each of the following scenarios, which is the most appropriate interviewing technique. Give a rationale for each answer.
What will be an ideal response?
Computer Science & Information Technology
All of the following can be used as a text delimiter EXCEPT ________
A) a word B) a tab C) a paragraph mark D) a comma
Computer Science & Information Technology
To arrange the data in all the worksheets in identical order and location use the consolidate by position option
Indicate whether the statement is true or false
Computer Science & Information Technology
The Favorites list lets you view all the webpages you have viewed. ________________________________?
Answer the following statement true (T) or false (F)
Computer Science & Information Technology