The assurance that data received are exactly as sent by an authorized entity is __________.
A. authentication B. data confidentiality
C. access control D. data integrity
D. data integrity
Computer Science & Information Technology
You might also like to view...
OgreAL uses a(n) object to represent an audio clip.
a. Effect b. SoundEffect c. Audio d. Sound
Computer Science & Information Technology
What is a use case scenario?
What will be an ideal response?
Computer Science & Information Technology
When naming a symbol, you can use ____.
A. space B. brackets C. numbers D. punctuation
Computer Science & Information Technology
A(n) ___________ is the interface pipeline that connects two information systems
a. HL7 message b. Continuity of care document c. Thread d. None of the above
Computer Science & Information Technology