Answer the following statements true (T) or false (F)

1. Threats are attacks carried out.

2. Computer security is protection of the integrity, availability, and
confidentiality of information system resources.

3. Data integrity assures that information and programs are changed only
in a specified and authorized manner.

4. Availability assures that systems works promptly and service is not
denied to authorized users.

5. The “A” in the CIA triad stands for “authenticity”.


1. False
2. True
3. True
4. True
5. False

Computer Science & Information Technology

You might also like to view...

Embedded instructions are called ____ and they are encased in angle brackets.

A. HTML tags B. HTML formatting symbols C. format code D. HTML links

Computer Science & Information Technology

The Shapes gallery displays when the Crop button is clicked

Indicate whether the statement is true or false

Computer Science & Information Technology

You can use a(n) _______________ to create a collection that offers only read-only access to others while allowing read–write access to yourself.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

________ is a useful feature to see differences between two versions of a presentation

Fill in the blank(s) with correct word

Computer Science & Information Technology