1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
xz_007 [3.2K]
3 years ago
13

An alteration threat violates information integrity. a. True b. False

Computers and Technology
1 answer:
Art [367]3 years ago
6 0
The answer is True


It intentionally or unintentionally compromises a system by making unauthorized changes to data. As compared to intentional changes which are usually malicious, unintentional changes are normally accidental. Changes and modifications to the system configurations can also compromise integrity. Such modifications might include deleting, changing, and creating information in a network resource. It is best to implement mechanisms on how one can track and audit such changes as they happen




You might be interested in
Programmers refer to a sequence of characters as a ____.
jekas [21]
In programming they know it as a String which is  a sequence of characters that are composed of literal constants or some kind of variables. A sting is any finite sequence of characters. every single string has its own lenght and this is one of the most important characteristics of them. Strings are essential to communicate information from the program to the user. 
5 0
3 years ago
Which of the following emerging technologies uses the principle of chromosomes to identify suspects?
Slav-nsk [51]

Answer:

b

Explanation:

they say this on the quiz but because of the irrationality DNA has

4 0
3 years ago
In what kind of attack can attackers make use of hundreds of thousands of computers under their control in an attack against a s
Allisa [31]

Answer:

distributed denial of service

Explanation:

5 0
3 years ago
Read 2 more answers
What statements best describe total rows? Check all that apply.
AfilCa [17]

Answer:

A- Their values are not stored in a database

C- their values update when changes are made in a table.

Explanation:

Just took it.

8 0
3 years ago
Read 2 more answers
If you want smaller tables to fit on a single page?
Vinil7 [7]
Well what i do is i make every thing a little smaller and if that dose not work make it bigger so that it just gos over the bottom of the page
8 0
3 years ago
Other questions:
  • What is a characteristic of high-level computer programming languages?
    8·1 answer
  • A thesaurus can be used to look up a (n) or word similar in meaning to a given word
    15·1 answer
  • The autocorrect feature can automatically capitalize the first letter in the names of days. true false
    15·1 answer
  • When you use the tilde operator (~ in a url for the attribute of a server control, it represents the _____ directory of the webs
    5·1 answer
  • PLEASE HELP!
    6·2 answers
  • Which student's strategy likely found the most academic success?
    6·1 answer
  • An alarm clock draws 0.5 A of current when connected to a 120 volt circuit. Calculate its resistance.
    10·1 answer
  • Hello Answerers it would be great if you could answer this:
    12·2 answers
  • Give five example of a dedicated device ​
    9·2 answers
  • write a program that computes an integer's checksum. to compute the checksum, break the integer into its constituent
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!