The answer is B. And Incase you were wondering D. Is hardware
The answer is True
It
intentionally or unintentionally compromises a system by making unauthorized changes
to data. As compared to intentional changes which are usually malicious, unintentional
changes are normally accidental. Changes and modifications to the system
configurations can also compromise integrity. Such modifications might include
deleting, changing, and creating information in a network resource.
It is best to implement mechanisms on how one can track and audit such changes as they happen
A tasks are suitable for creating an algorithm are:
- giving directions to a location.
- solving a math problem.
- tracking money in a bank account.
- tracking the number of items in inventory.
<h3>What is algorithm?</h3>
An algorithm is known to be a form of a procedure that is often employed in the act of solving a problem or carrying out a computation.
Note that in the case above, A tasks are suitable for creating an algorithm are:
- giving directions to a location.
- solving a math problem.
- tracking money in a bank account.
- tracking the number of items in inventory.
See options below
giving directions to a location
saving time writing a computer program
solving a math problem
tracking money in a bank account
tracking the number of items in inventory
Learn more about algorithm from
brainly.com/question/24953880
#SPJ1
I think it A I feel like report is right for the answer