________ ensures that systems work promptly and service is not denied to authorized users.

A) Integrity
B) Availability
C) Confidentiality
D) Accountability


B) Availability

Computer Science & Information Technology

You might also like to view...

The Java statement: g.fillOval(290, 100, 90, 55);

a. Draws a filled oval with its center at coordinates x=290, y=100, with height=90 and width=55. b. Draws a filled oval with its leftmost point at coordinates x=290, y=100, with height=90 and width=55. c. Draws a filled oval bounded by a rectangle with its upper-left corner at coordinates x=290, y=100, with width=90 and height=55. d. Draws a filled oval bounded by a rectangle with its upper-left corner at coordinates x=290, y=100, with height=90 and width=55.

Computer Science & Information Technology

When a comment is inserted, by default, the date shows ________ the name of the person commenting

A) to the right of B) to the left of C) above D) below

Computer Science & Information Technology

Most new cabling installations use CAT 3 UTP cable.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

?The personal interview usually is the least expensive fact-finding technique.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology