1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
almond37 [142]
3 years ago
9

Select the information protection item that ensures that information is correct and that no unauthorized person or malicious sof

tware has altered that data.
Computers and Technology
1 answer:
Ivan3 years ago
5 0

Answer:

Integrity

Explanation:

<em>Integrity</em>: It is the basic information protection technique which ensures that the information is correct and that no unauthorized person or malicious software has altered that information.

You might be interested in
What information most likely presents a security risk on your personal
11111nata11111 [884]

An information which most likely presents a security risk on your personal social networking profile is: personal e-mail address or password.

A social networking profile can be defined as a database that contains information about the social characteristics and some personal details of an individual on social media websites.

Some of the social characteristics and details of an individual that are shared on social media websites include the following:

  • Date of birth.
  • Occupation.
  • Religion.
  • Gender (sex).
  • Location.
  • Friends.

However, you should not share your personal e-mail address or password on any social media websites because with such information your social media account can be accessed by an attacker or a hacker.

In conclusion, personal e-mail address or password is a sensitive information that must never be shared on a social media website in order to avoid compromising the safety or security of your personal social networking profile.

Read more: brainly.com/question/21765376

6 0
2 years ago
Hi can yall tell me if my answers r right or wrong and if they are can u tell which ones r correct. And plz explain only if you
ipn [44]

Answer:

they all look correct to me! :)

Explanation:

8 0
4 years ago
An argument is different from a parameter in that an argument
erastovalidia [21]

Answer:

C. is the data passed into a parameter.

Explanation:

From the list of given options, the answer that correctly answers the question is option C.

Literally, arguments are values passed into parameters in functions;

Take for instance, the following code snippet in python

<em>def testcode(num):</em>

<em>     print(num * 2)</em>

<em>digit = 4</em>

<em>testcode(digit)</em>

In this example above;

The output is 8; and this is calculated by 4 * 2.

The parameter is <em>num</em><em> </em>and the argument is the <em>value</em> that will <em>be passed in num</em>; This value (argument) is 4

4 0
3 years ago
Read 2 more answers
Given the following word addresses: 3, 180, 43, 2, 191, 88, 190, 14, 181, 44, 186, 253a.Show the final cache contents for a thre
Vlad [161]

Answer:

Check the explanation

Explanation:

Kindly note that to get those block addresses <u><em>(which is a network service configuration that desires or initiate rejection from hosts with certain IP addresses, the address blocking can avoid access from some unauthorized or disruptive address.)</em></u>

word address/2 suppose 3/2=1.5 then we will declare the block address is 1. Like 180/2=90

Kindly check the attached image below to see the answer to the question.

3 0
4 years ago
What is the best website to get a iphone
sveticcg [70]
Generally I'd recommend not buying one online, tends to be cheaper from a shop - and better used, although their are some risks with 2nd hand devices, I think the big price cut it worth it. 

If you did want to buy online, maybe Amazon or Ebay?
7 0
4 years ago
Read 2 more answers
Other questions:
  • How did mark watney survive the accident
    9·1 answer
  • You have observed that it is possible that some of your organization's projects may end up having little or no value after they
    11·1 answer
  • In java, a class that is defined without an explicit extends clause ____.
    15·2 answers
  • During an upgrade for a new web server, Glen's company experienced a power surge. The power surge hit the new server, and now th
    10·1 answer
  • What do you do when you have computer problems? Check all that apply. PLEASE HELP
    9·2 answers
  • Which device contains or manages shared resources in a network?
    14·2 answers
  • Can some one help me answer this question plz
    8·1 answer
  • What three actions happen when you cloak a folder or file?
    6·1 answer
  • Instruction: weird I know (~ ̄³ ̄)~
    5·1 answer
  • CAN SOMEONE PLEASE HELP ME WRITE AN INTRODUCTION ??? COMMENT FOR TOPIC
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!