________ is the assurance that the systems responsible for delivering, storing, and processing information are accessible when required by authorized users.

A. Integrity
B. Confidentiality
C. Availability
D. Authenticity


Answer: C. Availability

Computer Science & Information Technology

You might also like to view...

Specifying the order in which statements are to be executed in a computer program is called:

a. An algorithm. b. Transfer of control. c. Program control. d. Pseudocode.

Computer Science & Information Technology

Prove that a functional dependency satisfies the formal definition of multi-valued dependency.

What will be an ideal response?

Computer Science & Information Technology

What is the default data type when creating an Access table?

A) Text B) Short text C) Long text D) Number

Computer Science & Information Technology

Match the Act with its provision

1. Gramm-Leach-Bliley Act a. provides for the recovery of indirect costs of victimization 2. National Information Infrastructure Protection Act b. provides for mandatory two-year sentence with penalties 3. Identity Theft and Assumption Deterrence Act c. prosecutes hackers and insiders who damage computers 4. Identity Theft Penalty Enhancement Act d. protects consumers' personal financial information 5. Identity Theft Enforcement and Restitution Act e. criminalizes use of public and nonpublic information 6. Drivers Privacy Protection Act f. restricts the disclosure of social security numbers and other personal information from a motor vehicle record

Computer Science & Information Technology