Talia notices figures in a report with no obvious source. This is an example of a violation of the law of ____

a.
Conservation of information

b.
Utilization of information

c.
Logical data flow

d.
Data integrity


a.
Conservation of information
Information cannot come from nowhere. All information must ultimately be traceable to data sources outside the system itself.

Computer Science & Information Technology

You might also like to view...

A(n) ____________________ is a router on the local network that is used to deliver packets to a remote network.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Begin the Works Cited page at  ____ from the top of the page.

A. Default (1)" B. 1.25" C. 1.5" D. 2"

Computer Science & Information Technology

?Microsoft Edge allows you to __________. 

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

COGNITIVE ASSESSMENT Which of the following terms refers to someone who accesses a computer or network illegally with the intent of malicious action?

A. script kiddie B. cracker C. cyberextortionist D. cyberterrorist

Computer Science & Information Technology