To keep information beyond reach of unauthorized users, is to keep the information _____.

A. secure
B. economical
C. simple
D. verifiable


Answer: A

Computer Science & Information Technology

You might also like to view...

A binary tree is a collection of nodes in which

A) each node has at most one predecessor and at most one successor B) each node has at most one predecessor and exactly two successors C) each node has at most one predecessor and at most two successors D) each node has at least one predecessor and at most two successors }

Computer Science & Information Technology

If three different variables need to be “returned” from a function, how should the function be designed (without using global variables)?

A. Use a call by value. B. Extern the variables. C. Use a call by reference. D. It is impossible to do this in C++.

Computer Science & Information Technology

Match each type of server to its function:

I. mid-range server II. Web server III. network server IV. file server V. server A. a group of computers run by specialized software B. same functions as a mainframe computer for smaller companies C. computer running specialized software to support Web pages D. organization and managing of files E. powerful, fast computers that run special software for specific purposes

Computer Science & Information Technology

On which line would the e-mail address of the primary recipient(s) be entered?

A) From: B) To: C) Cc: D) Bcc:

Computer Science & Information Technology