What is attained by keeping the data untouched from point of entry into the application to the point of exit?

A. Confidentiality
B. Availability
C. Integrity
D. Security


Answer: C

Computer Science & Information Technology

You might also like to view...

The PHP statement $a = new class name("First"); denotes a(n):

a. method b. constructor c. destructor d. attribute

Computer Science & Information Technology

____ paths reference links on web pages outside the current website.

A. Relative B. Absolute C. Root-relative D. Document-relative

Computer Science & Information Technology

By exploring sites that are popular with the target audience and the sites of competitors, you can familiarize yourself with graphic styles that the target audience ____.

A. likes B. dislikes C. insists upon D. is accustomed to

Computer Science & Information Technology

A program that searches a database for specific words and returns a list of webpages or documents in which the search term was found is a search ________

Fill in the blank(s) with correct word

Computer Science & Information Technology