Answer:
1. True
2. True
3. False
4. False
Explanation:
1. Information integrity is a term in computer business that describes the degree of accuracy, reliability and dependency of an information content, process and system.
The main purpose of Information integrity is to prevent or protect information from accidental or intentional but unauthorized changes.
Hence, it helps to ensure that data can be modified only by appropriate mechanism.
2. Pairing threats with vulnerabilities is a pair of risk analysis, that sets to determine the type of vulnerabilities a system or organization has, which can be paired with valid threats. Hence, the kind of risk involved in the vulnerability threats, can then be addressed.
3. Knowledge based identification (authentication) system which involves password or PIN are the most common form of authentication methods. Ranges from different devices such as phones and PC to platform such as website.
4. Biometric is a type of user authentication that relies on the measurement and calculation of the shape of the body, such as fingerprint, palm veins, face recognition, DNA, palm print, hand geometry, iris recognition, retina and odour/scent. It is often referred to as Physiological characteristics of Biometric system.
Answer:
Singing the words of the poem to the tune of Happy Birthday"
Explanation:
Mnemonic devices are those tools which can be used to improve a persons ability to remember something efficiently. In short, it a technique to memorize something in short period of time and remember it for longer period of time.
Memorizing a poem by singing it to the tune of Happy birthday is also a technique to remember the poem and memorizing it efficiently.
Wipe then off then spray them down then wipe off again
Answer:
Option B.
Explanation:
The delete key is used to delete the symbol after the insertion point.
Here, Michal is typed as Michael.
So, to delete the letter e from Michael, put the insertion point before e.
If you put insertion point after the letter e or before the letter l, l gets deleted.
In no case, you can put the insertion point after the letter l.
So, option B is correct.