The assurance that data received are exactly as sent by an authorized entity is __________.

A. authentication B. data confidentiality

C. access control D. data integrity


D. data integrity

Computer Science & Information Technology

You might also like to view...

OgreAL uses a(n) object to represent an audio clip.

a. Effect b. SoundEffect c. Audio d. Sound

Computer Science & Information Technology

What is a use case scenario?

What will be an ideal response?

Computer Science & Information Technology

When naming a symbol, you can use ____.

A. space B. brackets C. numbers D. punctuation

Computer Science & Information Technology

A(n) ___________ is the interface pipeline that connects two information systems

a. HL7 message b. Continuity of care document c. Thread d. None of the above

Computer Science & Information Technology