The three protections that must be extended over information can be described by the acronym ________.

Fill in the blank(s) with the appropriate word(s).


CIA

Computer Science & Information Technology

You might also like to view...

Streams are easy to parallelize, enabling programs to benefit from enhanced performance on ________ systems.

a. uni-core b. serial c. multi-core d. sequential

Computer Science & Information Technology

Sayako decides that she needs some help designing the layout and appearance of her letter. What can she use to quickly and easily create a preformatted document? Once she has written her letter, she needs to send it to many different people. Which Word feature can she use to easily personalize her letter for each individual client?

What will be an ideal response?

Computer Science & Information Technology

Which Linux command enables you to change the owner and the group with which a file or folder is associated?

A. mount B. chmod C. crontab D. chown

Computer Science & Information Technology

Stella is writing a report on how the Internet has changed the way we conduct business, learn, and live. Stella learns that businesses often use ____ tags instead of bar codes to identify and track goods.

A. B2C B. HD C. RFID D. XML

Computer Science & Information Technology