Answer:
b) iteration.
Explanation:
There are various algorithms which are used in computer programming. Iteration is also a type of algorithm which is used to create loops. The instructions are inserted once and then these instructions are repeated to create a loop function.
The command is more.
hope this helps.
The correct steps that indicate a correct order of acquisition as they relate to integrity and non-repudiation are:
- A hash of the disk is made
- A bit-by-bit copy is made
- A second hash is made
- A copy is made of the reference image
<h3>Is non-repudiation an aspect of integrity?</h3>
In general, nonrepudiation is known to be a term that puts together or combines authentication and integrity.
Note that Nonrepudiation is said to be a key or one of the pillars that pertains to information assurance.
The integrity in cyber security is known to be the act of keeping safe against any form of an improper information modification or destruction.
Hence, The correct steps that indicate a correct order of acquisition as they relate to integrity and non-repudiation are:
- A hash of the disk is made
- A bit-by-bit copy is made
- A second hash is made
- A copy is made of the reference image
Learn more about acquisition from
brainly.com/question/11412887
#SPJ1
Answer:
keeping software programs up-to-date
Explanation: