Which of the principles of security is supported by hashing?

a. Availability
b. Confidentiality
c. Integrity
d. Safety


Answer: c. Integrity

Computer Science & Information Technology

You might also like to view...

In Sitton v. Print Direction, Inc., the court found that Stanton's use of Sitton's computer was:

a. not lawful. b. computer theft. c. computer trespass. d. not “without authority.”

Computer Science & Information Technology

Which of the following is the proper method to apply a transition effect?

a. ``` element.filters( "blendTrans" ).apply(); ``` b. ``` element.transition( "blendTrans" ).filters.apply(); ``` c. ``` element.apply( "blendTrans" ).transition(); ``` d. ``` element.filters( transition( "blendTrans" ) ).apply; ```

Computer Science & Information Technology

Which of the following is not a way to address data validation violations?

A) Correct the data. B) Press the "Allow This Exception" button and keep going. C) Change the data validation rule. D) Cancel the record entry.

Computer Science & Information Technology

The first step in creating a report is to select ____ in the Installed Templates pane under Visual Basic.

A. Reporting B. ReportObject C. UseReport D. ReportSource

Computer Science & Information Technology