Arturo is attempting to protect the database (data) of an information system (IS).
<h3>What is an information system?</h3>
An information system (IS) can be defined as a set of computer systems, that is typically used to collect, store, and process data, as well as the dissemination of information, knowledge, and the distribution of digital products.
In Cybersecurity, there are two (2) main techniques that can be used to check data when inputted in an information system (IS) and these include:
Data validation is a type of check which is primarily performed by a software program (application) to make sure that the data which is entered into an information system (IS) is allowable and sensible.
This ultimately implies that, any data that is not allowed or sensible are rejected and discarded by the computer system.
In conclusion, we can deduce that Arturo is attempting to protect the database (data) of an information system (IS).
Read more on data here: brainly.com/question/25885448
Answer: databases, electronic archives, online libraries, spreadsheets (B,C,E,F)
Explanation: I just took the test :)) hope u have a great day and remeber u are beautiful <3
The permission to give the executive group the right to read, change, and assign permissions to document is Give executive Change to shared permissions
<h3>What do you mean of executive?</h3>
An executive is seen as a kind of a powerful person and they are the people that are known to be responsible for making things go on or run smoothly in any organization.
Therefore, The permission to give the executive group the right to read, change, and assign permissions to document is Give executive Change to shared permissions
Learn more about executive from
brainly.com/question/838027
#SPJ1
Answer:
c. Book and Periodical are subclasses of LoanableItem
Explanation:
Books are kept in library in a periodical manner. Both classes are not superior, they are subclasses of LoanableItem. Library uses common guide which makes it easy to find a book.