Talia notices figures in a report with no obvious source. This is an example of a violation of the law of ____
a.
Conservation of information
b.
Utilization of information
c.
Logical data flow
d.
Data integrity
a.
Conservation of information
Information cannot come from nowhere. All information must ultimately be traceable to data sources outside the system itself.
You might also like to view...
A(n) ____________________ is a router on the local network that is used to deliver packets to a remote network.
Fill in the blank(s) with the appropriate word(s).
Begin the Works Cited page at ____ from the top of the page.
A. Default (1)" B. 1.25" C. 1.5" D. 2"
?Microsoft Edge allows you to __________.
Fill in the blank(s) with the appropriate word(s).
COGNITIVE ASSESSMENT Which of the following terms refers to someone who accesses a computer or network illegally with the intent of malicious action?
A. script kiddie B. cracker C. cyberextortionist D. cyberterrorist