1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bingel [31]
4 years ago
12

Which of the following would be an example of a loss of record integrity in a

Computers and Technology
1 answer:
saul85 [17]4 years ago
8 0

Answer: D)Although you clicked the option to ''do'nt share information with any other  companies or sites on the bookstores website, you are getting unsolicited  e-mail messages from some of the companies that post ads on that  site.

 Explanation: Loss of record integrity is defined as the losing the  accuracy and originality of the data present in the form of records. Receiving  unasked and unrequired emails regarding posting  the ad from various companies can be example of losing integrity of information.  

By posting ads on other sites might lead to loss of actuality of information because these sites are not assured and authorized , also the option of posting is arising even after  opting no sharing of information with other sites .

Other options are incorrect because incorrect password is regarding the security issue,  mortgage refers with some kind of contract and receiving message from online application regarding shopping is the reminder of shopping from that particular ad and the way of advertising.Thus, the correct option is option(D).

You might be interested in
What function would you use to calculate the total interest paid for the first year of a mortgage?.
WITCHER [35]

Answer:

To calculate the total interest paid for the first year of a mortgage, the formula M = [P.r (1+r)n] / [(1+r)n-1] × 12 can be used.

Explanation:

3 0
2 years ago
Create a class called Circle, which has (i) an attribute radius, (ii) a method that returns the current radius of a circle objec
nadya68 [22]

Answer:

Explanation:

The following class is written in Java. I created the entire Circle class with each of the methods and constructor as requested. I also created a tester class to create a circle object and call some of the methods. The output can be seen in the attached picture below for the tester class.

class Circle {

   double radius;

   public Circle(double radius) {

       this.radius = radius;

   }

   public double getRadius() {

       return radius;

   }

   public void resetRadius() {

       radius = 0;

   }

   public double calculateArea() {

       double square = Math.pow((Math.PI * radius), 2);

       return square;

   }

}

8 0
3 years ago
The protection of the confidentiality, integrity, and availability of information assets, whether in storage, processing, or tra
Sergeu [11.5K]

Answer: Information security

Explanation:

 The information security is one of the system that keeps the data confidential, assure the integrity and also availability of the information or data.

This system is basically refers as the CIA triad in the information security system and the data risk management.

The main aim of the information security is that keeps the data protected from the unauthorized accessing and also  controlling the access in the system.

Therefore, Information security is the correct answer.

8 0
3 years ago
Question 7 of 25
Vika [28.1K]

Explanation:

the right answer may be A.

5 0
2 years ago
In cell B12, enter a formula to calculate the amount budgeted for Mileage to/from Airport. The amount is based on the Mileage Ra
sashaice [31]

Answer:

X=mileage+y

Explanation:

7 0
3 years ago
Other questions:
  • Waterpower was first harvested by ancient societies using
    5·1 answer
  • 1. Describe an application where a series circuit might work better than a parallel circuit
    11·2 answers
  • Which of the descriptions listed below best describes the step in the reverse engineering process called functional analysis? A)
    12·1 answer
  • (011001111)2=(?)10 can anyone solve this urgent <br><br> Hurry
    11·2 answers
  • Please try and solve this
    5·1 answer
  • In Python please.
    13·1 answer
  • Which of the following is the net effect of the following combination of share and NTFS permissions when the share is accessed o
    7·1 answer
  • Which one of the following, in addition to disciplinary programs and drug-testing, can employers misuse as a form of retaliation
    8·1 answer
  • A video game controller contains the buttons: A, B, X, Y. When the player presses A their character Jumps. When the player press
    15·1 answer
  • 56- What is the term used when you press and hold the left mouse key and more the mouse
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!