_____________ has been defined as ensuring information is accessible only to those authorized to have access and is one of the cornerstones of information security.

A. integrity
B. confidentiality
C. accessibility
D. availability
E. privacy


Answer: B

Computer Science & Information Technology

You might also like to view...

A document can be saved as ____________________ text so it can be opened by other word processing software.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Sum all the elements of the array, using a for statement. Declare the integer variable x as a control variable for the loop.

What will be an ideal response?

Computer Science & Information Technology

When using gestures, you can zoom in, zoom out, and switch between applications

Indicate whether the statement is true or false

Computer Science & Information Technology

What will occur when two or more devices send a signal at the same time to a hub device?

A) An electrical collision will occur, corrupting both signals. B) A collision will be detected, and neither signal will go through. C) A collision will be detected, and the devices will have to take turns sending. D) The first signal to arrive will be sent, and the other signal(s) will have to wait.

Computer Science & Information Technology