1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
barxatty [35]
4 years ago
9

1. Information integrity ensures that data can be modified only by appropriate mechanisms.

Computers and Technology
2 answers:
maks197457 [2]4 years ago
8 0

Answer:

1 is True.

2 is true

3 is false

4 is false.

Explanation:

Information integrity refers to accuracy and consistency of information through out it's life cycle. It is modified through appropriate means.

Smart cards are most popular form of authentication credentials currently used because cryptographic keys and other secrets on the cards are protected and difficult to steal.

Biometric authentication is the automated form of recognising a person based on it's behavior or physiological traits.

GrogVix [38]4 years ago
6 0

Answer:

1. True

2. True

3. False

4. False

Explanation:

1. Information integrity is a term in computer business that describes the degree of accuracy, reliability and dependency of an information content, process and system.

The main purpose of Information integrity is to prevent or protect information from accidental or intentional but unauthorized changes.

Hence, it helps to ensure that data can be modified only by appropriate mechanism.

2. Pairing threats with vulnerabilities is a pair of risk analysis, that sets to determine the type of vulnerabilities a system or organization has, which can be paired with valid threats. Hence, the kind of risk involved in the vulnerability threats, can then be addressed.

3. Knowledge based identification (authentication) system which involves password or PIN are the most common form of authentication methods. Ranges from different devices such as phones and PC to platform such as website.

4. Biometric is a type of user authentication that relies on the measurement and calculation of the shape of the body, such as fingerprint, palm veins, face recognition, DNA, palm print, hand geometry, iris recognition, retina and odour/scent. It is often referred to as Physiological characteristics of Biometric system.

You might be interested in
Your organization wants to implement a 5-year rotation plan for all of its computing devices. What percentage of the computer fl
sashaice [31]

Answer:

20

Explanation:

C the answer is 20

7 0
3 years ago
Read 2 more answers
In which type of network can a computer upload and download data at the same time?
REY [17]

answer is peer-to-peer


hope this helps

8 0
3 years ago
How do computer users benefit from the increased speed?
erma4kov [3.2K]

Answer:

jrjhfn4

Explanation:

jejehrurjrbrr

7 0
3 years ago
Streaming media known as _____ is stored on the provider's server, which allows you to play the media multiple times. Graphics t
Marysya12 [62]

Answer:

On - demand

Transition

Codecs

Media Player

Video compression

Explanation:

The image for the question is attached.

Another name for streaming of media is known as on - demand service. The resources are only available based on request.

Transition tells a viewer when a scene ends and another one begins.

Codecs has a lot of standard and MPEG is one of the popular standard. Some include Dolby Digital (AC3, ATSC A/52, ETSI TS 102 366).

Media Player is the type of software needed to watch a video on a computer.

Video Compression is the technology that is used to compress and depress video files.

7 0
3 years ago
Use the pulley image below to help u answer. click on it if u cant see.
Crank
1 is 2 2 is 0 because the pull of the box is removed
8 0
3 years ago
Read 2 more answers
Other questions:
  • Question # 6
    13·1 answer
  • Analyze the following code. Select one: A. The code is wrong. You should replace if (even) with if (even == true). B. The code d
    13·1 answer
  • Translate each of these statements into logical expressions using predicates, quantifiers, and logical connectives. a) Something
    7·1 answer
  • Which of the following is where you can save, select a template, change document properties, and close or exit excel?
    8·1 answer
  • Describe conductors and insulators in terms of energy
    11·1 answer
  • Www.microsoft.com is an example of this (two words) (last letter is e) and has to be (10 letters)
    10·1 answer
  • Who knows a website to learn how to code in java?
    7·1 answer
  • During the Inspect and Adapt event, how are reflection, data collection, problem solving, and identification of improvement acti
    5·1 answer
  • Explica porque se afirma que la existencia de estaciones cambia las combstumbres y la cultura​
    14·1 answer
  • The capacity of your hand drive is measured in​
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!