Threats to ______________ are threats that actually alter data
a. authenticity
b. confidentiality
c. integrity
d. security
c
You might also like to view...
A document filed in juvenile court alleging that a juvenile is a delinquent, a status offender, or a dependent and asking that the court assume jurisdiction over the juvenile is a:
a. Juvenile summons. b. Writ of habeas corpus. c. Juvenile petition. d. Notice of adult jurisdiction.
_____ focus almost exclusively on the three goals of security—preventing prisoners from escaping, keeping them from hurting the staff or one another, and keeping out contraband
a. Traditional facilities c. Maximum security prisons b. Super-maximum prison d. Minimal security prisons
Which rule states that courts will not accept evidence obtained by unreasonable search and seizure?
a. silver-platter rule b. exclusionary rule c. roots-of-the-tree rule d. rule of thumb
What type of evidence establishes the existence of a fact that is in question without relying on inference?
A. Direct B. Circumstantial C. Real D. Relevant