There are four fundamental requirements for a successful, secure transaction: privacy, integrity, authentication and_______.
a) restricted environment.
b) security.
c) nonrepudiation.
d) none of the above.
c) nonrepudiation.
You might also like to view...
Which of the following statements are true?
a. All methods in FileInputStream/FileOutputStream are inherited from InputStream/OutputStream. b. You can create a FileInputStream/FileOutputStream from a File object or a file name using FileInputStream/FileOutputStream constructors. c. The return value -1 from the read() method signifies the end of file. d. A java.io.FileNotFoundException would occur if you attempt to create a FileInputStream with a nonexistent file. e. A java.io.FileNotFoundException would occur if you attempt to create a FileOutputStream with a nonexistent file.
A junction table contains data from the ________ fields in two tables
A) primary key B) foreign key C) tab control D) index key
During a mail merge, the ________ document contains the text that will remain constant in all of the resulting letters or labels
Fill in the blank(s) with correct word
Match the beginning of each sentence with the ending of each in regard to design principles:
I. Sans serif fonts II. Serif fonts III. Underlined text IV. Italics V. Thirty-six point font A. are best used if the presentation will be printed. B. should not be used (except as hyperlinks). C. should be used sparingly. D. should be used when delivering a presentation on a projector. E. should be the minimum for title placeholders.