1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
DochEvi [55]
3 years ago
5

Can someone please help with one? I will mark brainlest!!!

Computers and Technology
2 answers:
Snowcat [4.5K]3 years ago
4 0

I want to say that it is data authenticity?

Nadya [2.5K]3 years ago
3 0

A) Data integrity is the assurance of the accuracy and consistency of data throughout its life cycle. Since the main concern for this accounting firm is that the data remain unaltered, therefore data integrity would be the main concern in this situation.

Let me know if you have any questions.

You might be interested in
Justify the need for branching and jump codes in the instruction set using real world scenarios
topjm [15]

Answer:

As in the real world, people using a program would provide different inputs, that would require different outputs. For example in a traffic light system, there could be a function that constantly checks for if the button is pressed. When the button is pressed the traffic light loop would branch out of its current running code in order to turn the lights to red, and allow the pedestrians to cross.

8 0
3 years ago
1. Technician A says you can identify a hybrid vehicle by the badging on the engine cover. Technician B says you can identify a
Liono4ka [1.6K]

Answer:

It's B i did the quiz

and got an 100%

Explanation:

Hope this helps :D

6 0
2 years ago
Select the correct answer from each drop-down menu
Oksanka [162]

Answer:

First one is B size because if it's too small or big it might get pixelated or fuzzy, and for the second parr it would be B printable .

Explanation:

7 0
3 years ago
Read 2 more answers
Differentiate between symmetric and asymmetric encryption
Shalnov [3]

Answer:

While symmetric encryption uses a single shared key to encrypt and decrypt data, asymmetric uses two separate keys

8 0
2 years ago
Read 2 more answers
A company accidentally sends a newsletter with a mistyped website address. The address points to a website that has been spoofed
Thepotemich [5.8K]

Answer:

Option (A) is the right answer.

Explanation:

The following terms can be described as :

Phishing: Phishing can be described as the concept of stealing personal data i.e. credit card, bank account information, etc. of customers by sending fraud emails or by making fraud webpages on the name of a reputed company.

Tailgating: tailgating can be defined as the concept of getting entry with the authorized person in a restricted zone.

Baiting: baiting can be described as the term of stealing personal data by giving greed to customers by telling them fraud offers.

Quid pro quo: quid pro quo can be defined as the concept where the attacker takes the access of the system.  

According to the scenario, the most appropriate answer is option (A) because the company sends a wrong web address which is used by hackers to collect user's personal data which comes under phishing.

3 0
3 years ago
Other questions:
  • In real-world environments, risks and their direct consequences will most likely span across several domains. However, in the la
    12·1 answer
  • Which term describes the order of arrangement of files and folders on a computer
    11·1 answer
  • What would you need to install if you have an app that is incompatible with your current operating system?
    13·1 answer
  • Write a Java application that uses the Math class to determine the answers for each of the following: a. The square root of 37 b
    10·1 answer
  • If a triathlon is a sport combining three events, what do you think would be the word for a sport combining five events?
    7·1 answer
  • What is the bit pattern (raw binary) of the single precision representation of the decimal number 0.125 following IEEE 754 stand
    9·1 answer
  • Write a program in Cto define a structure Patient that has the following members
    12·1 answer
  • Describe how computer are used in ticket counter?​
    10·1 answer
  • Write a description about this picture
    13·2 answers
  • Shouldn't I be virtuoso? I keep refreshing and opening and closing tabs but it still hasn't updated
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!