Which of the principles of security is supported by hashing?
a. Availability
b. Confidentiality
c. Integrity
d. Safety
Answer: c. Integrity
You might also like to view...
In Sitton v. Print Direction, Inc., the court found that Stanton's use of Sitton's computer was:
a. not lawful. b. computer theft. c. computer trespass. d. not “without authority.”
Which of the following is the proper method to apply a transition effect?
a. ``` element.filters( "blendTrans" ).apply(); ``` b. ``` element.transition( "blendTrans" ).filters.apply(); ``` c. ``` element.apply( "blendTrans" ).transition(); ``` d. ``` element.filters( transition( "blendTrans" ) ).apply; ```
Which of the following is not a way to address data validation violations?
A) Correct the data. B) Press the "Allow This Exception" button and keep going. C) Change the data validation rule. D) Cancel the record entry.
The first step in creating a report is to select ____ in the Installed Templates pane under Visual Basic.
A. Reporting B. ReportObject C. UseReport D. ReportSource