Which phrase best describes security?
A. the procedures used to protect data
B. the goal to be free from danger as well as the process that achieves that freedom
C. the protection of data from harm
D. the process of hiding sensitive data with the goal of maintaining privacy
Answer: B
Computer Science & Information Technology
You might also like to view...
What are some of the C functions susceptible to buffer overflow?
What will be an ideal response?
Computer Science & Information Technology
The Boost.Regex algorithm ________ changes all occurrences of a pattern in a string to a specified string.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
Pressing the ________ key in a table moves to the next cell in the same row
Fill in the blank(s) with correct word
Computer Science & Information Technology
DSTDEV calculates the standard deviation of a sample population in a database range
Indicate whether the statement is true or false
Computer Science & Information Technology