1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
xz_007 [3.2K]
3 years ago
13

An alteration threat violates information integrity. a. True b. False

Computers and Technology
1 answer:
Art [367]3 years ago
6 0
The answer is True


It intentionally or unintentionally compromises a system by making unauthorized changes to data. As compared to intentional changes which are usually malicious, unintentional changes are normally accidental. Changes and modifications to the system configurations can also compromise integrity. Such modifications might include deleting, changing, and creating information in a network resource. It is best to implement mechanisms on how one can track and audit such changes as they happen




You might be interested in
The _______ displays the name of the open file and the program.
Svetlanka [38]
The answer is a. Title Bar

The Title Bar displays the name of the program and the name of the current open file, whether it is just displayed or being edited. It is located at the top of the program window.
3 0
3 years ago
Scripting languages are unique computer languages with a specialized function. explain what scripting languages do, and how this
yarga [219]

Scripting languages are unique computer languages because they automate task that could be done by human operator and are easy to use.

<h3>What is a scripting language?</h3>

Scripting languages are programming languages that is interpreted.

They are programming languages that automates the task that will originally be performed by a human operator.

Scripting languages are used to give instruction to other software to run accordingly to how you want it.

The scripting language is different form other language base on the fact that its interpreted . This means the code are translated to machine code when it is run.

The major advantage of scripting languages is that it is human readable and understandable.

Examples of scripting languages are Python and JavaScript.

learn more on scripting here: brainly.com/question/12763341

#SPJ1

3 0
2 years ago
Which computer program did these companies use? fb, Microsoft, Google, LinkedIn​
Verdich [7]

Answer:most of the computer campanies use java script, phyton, c++ or c sharp .

Explanation:

5 0
4 years ago
_________ was demilitarized by Germany because of the Treaty of Versailles. The Rhineland The North Sea The Ruhr Valley Eastern
Alchen [17]

The Rhineland was turned into a demilitarized zone because of the Versailles Treaty.   -From 1919, Germany wanted to get rid of this zone because it left them open to attack from Belgium, Holland and France.   In March 1936, Germany's army occupied the Rhineland.

8 0
3 years ago
Read 2 more answers
Which of the following elements does the cinematographer have to be concerned with? (Select all that apply).
Anika [276]

Answer:

A cinematographer has to be concerned with the balance of light and dark and depth of focus.

5 0
4 years ago
Other questions:
  • PLEASE HELP
    14·2 answers
  • You have a multi-domain Windows Server 2008 forest. You need to make a shared folder available to users from several domains. Wh
    9·1 answer
  • Using a caesar cypher with an offset of three characters (a -&gt; d, b -&gt;e, ...., z -&gt; c), what would be the correct cyphe
    6·1 answer
  • A(n) ____ consists of a series of related instructions, organized for a common purpose, that tells the computer what tasks to pe
    6·1 answer
  • A look to different section of the same page is known as_____.
    7·1 answer
  • A connection between files that allows data to be transferred from one file to another is a _______________________.
    6·1 answer
  • Technology trends in education play a key role in a student’s: social life. motivation. career readiness. job search.
    8·2 answers
  • An epic games service is unavailable at the moment
    8·1 answer
  • How do you enlarge an image to see more detail on it? (1 point)
    14·2 answers
  • Selah infects the ads on a website that users from her target company frequently visit with malware as part of her penetration t
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!