1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
barxatty [35]
4 years ago
9

1. Information integrity ensures that data can be modified only by appropriate mechanisms.

Computers and Technology
2 answers:
maks197457 [2]4 years ago
8 0

Answer:

1 is True.

2 is true

3 is false

4 is false.

Explanation:

Information integrity refers to accuracy and consistency of information through out it's life cycle. It is modified through appropriate means.

Smart cards are most popular form of authentication credentials currently used because cryptographic keys and other secrets on the cards are protected and difficult to steal.

Biometric authentication is the automated form of recognising a person based on it's behavior or physiological traits.

GrogVix [38]4 years ago
6 0

Answer:

1. True

2. True

3. False

4. False

Explanation:

1. Information integrity is a term in computer business that describes the degree of accuracy, reliability and dependency of an information content, process and system.

The main purpose of Information integrity is to prevent or protect information from accidental or intentional but unauthorized changes.

Hence, it helps to ensure that data can be modified only by appropriate mechanism.

2. Pairing threats with vulnerabilities is a pair of risk analysis, that sets to determine the type of vulnerabilities a system or organization has, which can be paired with valid threats. Hence, the kind of risk involved in the vulnerability threats, can then be addressed.

3. Knowledge based identification (authentication) system which involves password or PIN are the most common form of authentication methods. Ranges from different devices such as phones and PC to platform such as website.

4. Biometric is a type of user authentication that relies on the measurement and calculation of the shape of the body, such as fingerprint, palm veins, face recognition, DNA, palm print, hand geometry, iris recognition, retina and odour/scent. It is often referred to as Physiological characteristics of Biometric system.

You might be interested in
Def shared_motif(dna_list):
krok68 [10]

Answer:

Explanation:

The following code is written in Python, the function creates various nested loops to loop through each individual string comparing letter by letter in order to find the longest common substring. Finally, returning the substring itself.

def shared_motif(dna_list):

   substr = ''

   if len(dna_list) > 1 and len(dna_list[0]) > 0:

       for x in range(len(dna_list[0])):

           for i in range(len(dna_list[0]) - x + 1):

               if i > len(substr) and all(dna_list[0][x:x + i] in y for y in dna_list):

                   substr = dna_list[0][x:x + i]

   return substr

arr = ["GATTACA", "TAGACCA", "ATACA"]

stems = shared_motif(arr)

print(stems)

5 0
3 years ago
When date is processed into a meaningful form, i becomes _______.
mrs_skeptik [129]

Answer:

When date is processed into a meaningful form, it becomes information.

6 0
3 years ago
The collection of programs on a computer is referred to as _______________.​
schepotkina [342]
It is referred to as software

Software consists of an entire set of programs and routines linked with the operation of a computer. In other words, it is a collection of executable instructions that enable you to interact with a computer and its hardware. A computer would be rendered useless without software.

 






5 0
4 years ago
You are given an array x of string elements along with an int variable n that contains the number of elements in the array. You
jarptica [38.1K]

Answer and Explanation:

Make an algorithm of that which include array x of string where Mode of the value of the array means that you have the values such that 1.2,4,2,6,7,8,2 so 2 is the value of set as it appears more than other number similarly when a array of x has been given.First of all initialize a variable then declare it . so for initialization create a variable .Let suppose i create a variable of add and initialize it with 0 and given a it data type integer then

int add= 0;  // declaration

int add[]=0; // declaration and initialization in array

class add {  

void main(String array[]){  

int add[]=0;//declaration and instantiation  

int add[] = new int [3];

add[0]=30;//initialization  

add[1]=80;  

add[2]=20;  

output the given array of string

for ( int i = 0 ; i <add.length ;i++)

cout <<add[i];

 }

Taking an other example let initialization and declare array of string and print the greater value.For this create a variable with integer data type \

class Test{  

void main(String[] array){  

       //declaration of array

int test[][] = new int [2];

test[0]; new int [2];

test[1]; new int [4];

for initialization of array lets take variable a with data type integer

      int a=0;  

//taking loop for condition

       for (int i=0; i<test.length; i++)  

           for(int j=0; j<test[i].length; j++)  

//if the loops working properly then take increment in the variable a

               test[i][j] = a++;  

this process repeat until loops got false

   for (int i=0; i<test.length; i++)  

           for(int j=0; j<test[i].length; j++)  

         cout<<test[i][j]<<"+"<<"";  

           }  

           System.out.println();

       }  

   }  

6 0
4 years ago
What is the full form of ms-word?​
Alex

Answer:

microsoft word

Explanation:

i got certified on it sooooooooooo...

6 0
3 years ago
Read 2 more answers
Other questions:
  • You have just plugged a USB portable hard drive into an older laptop and the disk has not appeared as available. You are concern
    11·1 answer
  • Unlike a virtual image, a real image
    7·1 answer
  • Which major and minor keys have no sharps or flats apex?
    5·2 answers
  • Which of the following refers to a combination of hardware and software that ensures only authorized individuals gain entry into
    11·1 answer
  • GenXTech is a growing company that develops gaming applications for military simulations and commercial clients. As part of its
    8·1 answer
  • Heelo how do u do python syntax lesson 11 on code academy
    12·1 answer
  • How can a signature be added to an email message? Check all that apply.
    10·2 answers
  • Hard and soft skills can both be transferable skills. *<br><br> True<br><br> False
    5·2 answers
  • What are the defenses to protect against these attacks?
    13·1 answer
  • Normal view definition
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!