1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Reil [10]
3 years ago
7

An employee is angry with his boss and wants to sabotage the company. To accomplish this he secretly changes some of the values

in his boss's copy of the quarterly report. His boss then reads this false data and makes decisions based on this fraudulent information. In this instance, what quality of information security has been damaged?a. Availability loss
b. Confidentiality loss
c. Integrity loss
d. Access loss
Computers and Technology
1 answer:
bonufazy [111]3 years ago
7 0

Answer: Integrity loss

Explanation:

A set of data is said to have experienced a Loss of Integrity if some event has caused it to be incorrectly altered

You might be interested in
It is a data being transported on a network​
sleet_krkn [62]

Answer:

The answer is <em>data packet or packet.</em> A packet is a small amount of data that is travelling, sending or receiving in the network.

6 0
3 years ago
To open a Google Doc in another software application, the user must first download it. True or false?
alexira [117]

Answer:

True

Explanation:

5 0
3 years ago
Read 2 more answers
Grace Hopper led the development of ______, a programming language for business applications.
soldi70 [24.7K]

Answer: Machine independent programming language which is known as COBOL.

Explanation:

 Grace hopper born in 1906 in the New York city and she made the machine independent programming language idea popular all over the world. It prompted the advancement of COBOL, an early significant level programming language even used today.

Preceding joining the US Navy, Hopper done her  Ph. D in the mathematics subject from the Yale University and she was also a professor at the Vassar College.

8 0
3 years ago
Read 2 more answers
Find the largest and smallest byte,short,int,long,float, and double. Which of these data types requires the least amount of memo
gladu [14]
<h2>double, long, float, short, byte</h2>

Explanation:

The given data types are built-in types. According to java, the following holds right to justify the order.

Double:

  • This occupies 64 bits
  • It can hold decimal values
  • Example: "1.23456e300d, -1.23456e-300d, 1e1d"

Float:

  • It occupies 32 bits
  • Holds decimal values
  • Example: "1.23e100f, -1.23e-100f, .3f, 3.14F"

Long:

  • It occupies 64 bits
  • Example: "-2L, -1L, 0L, 1L, 2L"

Short:

  • It occupies 16 bits
  • Stores twos complement integer

Byte:

  • It occupies 8 bits
  • Stores twos complement integer
7 0
3 years ago
Which is NOT true?<br> 9 + 4 = 17 - 4<br> 8 + 7 = 14 + 3<br> 11 = 19 - 8<br> 5 + 8 = 20 - 7
Fudgin [204]

Answer:

B 8 + 7 = 14 + 3

Explanation:

7 0
2 years ago
Other questions:
  • If you plan on operating several applications at s time, the amount of RAM should be considered when purchasing a computer
    10·2 answers
  • Type the correct answer in the box.
    15·1 answer
  • The CUSTOMERS and SALES tables contain these columns:
    6·1 answer
  • What is alfred anderson in creole?
    6·1 answer
  • One lap around a standard high-school running track is exactly 0.25 miles. Write the function miles_to_laps() that takes a numbe
    8·1 answer
  • Which view in the View tab of the ribbon is the easiest place to add a header or a footer? Normal view Custom Views Page Layout
    5·2 answers
  • Question # 2
    7·1 answer
  • An animation of a person standing with their arms extended out to their sides. There are 3 dimensional boxes around the torso of
    5·1 answer
  • Everyone within a company needs to be aware of what data can do to improve business processes and how to make it happen. Which c
    13·1 answer
  • a functional policy declares an organization's management direction for security in such specific functional areas as email, rem
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!