Which of the following ensures that information is correct and no unauthorized person or malicious software has altered it?

A. Protection
B. Availability
C. Confidentiality
D. Integrity


Answer: D

Computer Science & Information Technology

You might also like to view...

Reference-type variables (called references) store ________ in memory.

a. the value of an object b. a copy of an object c. the location of an object d. the size of an object

Computer Science & Information Technology

If you are a Windows user and use a laptop or a keyboard without a keypad and want to insert special characters, use the ____________________ utility that comes free with Windows.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

?Which of the following is NOT a type of broadband connection?

A. ?DSL B. ?dial-up C. FTTP D. ?Fixed wireless

Computer Science & Information Technology

Which callback method is called when the Fragment’s user interface becomes visible but is not yet active?

a. onStart() b. onCreateView() c. onResume() d. onPause()

Computer Science & Information Technology