___________ provides us with the means to trace activities in our environment back to their source.

A. Accountability
B. Authentication
C. Access
D. Nonrepudiation
E. Authorization


Answer: A. Accountability

Computer Science & Information Technology

You might also like to view...

The Crosstab icon can be found in the Design tab of the Design View of a Select Query

Indicate whether the statement is true or false

Computer Science & Information Technology

When you add a new slide following the title slide, PowerPoint uses the _____ slide layout for the new slide.

A. Title Only B. Title and Content C. Comparison D. Blank

Computer Science & Information Technology

Which of the following is an uncompressed audio file format?

a. AAC b. WAV c. MP3 d. WMA

Computer Science & Information Technology

Rosanna has assembled her new personal computer. While purchasing the system, the vendor suggested that she use a(n) _____ to protect the computer from damage due to power fluctuations.

A. ?encrypted flash drive B. ?surge suppressor C. ?ruggedized drive D. ?kill switch

Computer Science & Information Technology