Answer:
d. integrity
Explanation:
Data integrity is defined as the condition in which all of the data in the database are consistent with the real-world events and conditions.
Data integrity can be used to describe a state, a process or a function – and is often used as a proxy for “data quality”. Data with “integrity” is said to have a complete or whole structure. Data integrity is imposed within a database when it is designed and is authenticated through the ongoing use of error checking and validation routines. As a simple example, to maintain data integrity numeric columns/cells should not accept alphabetic data.
Monitor, keyboard, CPU, mouse, and I believe the USB drive , DVD drive and hardware system
Answer:
By Using the Greedy- Activity- Selection algorithm
Explanation:
The Greedy- Activity- Selection algorithm in this case involves
First finding a maximum size set S1, of compatible activities from S for the first lecture hall.
Then using it again to find a maximum size set S2 of compatible activities from S - S1 for the second hall.
This is repeated till all the activities are assigned.
It requires θ(n2) time in its worse .
Answer:
The answer is "True"
Explanation:
In computer science, the IEEE project uses this security project, it is designed for wireless network, that provides the same level security and the data encryption for cable network also.
- It provides protects in wireless transmissions from both the poking and collecting information of packets.
- It also lets hackers crack their computer, that's why the given statement is true.