Which phrase best describes security?

A. the procedures used to protect data
B. the goal to be free from danger as well as the process that achieves that freedom
C. the protection of data from harm
D. the process of hiding sensitive data with the goal of maintaining privacy


Answer: B

Computer Science & Information Technology

You might also like to view...

What are some of the C functions susceptible to buffer overflow?

What will be an ideal response?

Computer Science & Information Technology

The Boost.Regex algorithm ________ changes all occurrences of a pattern in a string to a specified string.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Pressing the ________ key in a table moves to the next cell in the same row

Fill in the blank(s) with correct word

Computer Science & Information Technology

DSTDEV calculates the standard deviation of a sample population in a database range

Indicate whether the statement is true or false

Computer Science & Information Technology