1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
barxatty [35]
4 years ago
9

1. Information integrity ensures that data can be modified only by appropriate mechanisms.

Computers and Technology
2 answers:
maks197457 [2]4 years ago
8 0

Answer:

1 is True.

2 is true

3 is false

4 is false.

Explanation:

Information integrity refers to accuracy and consistency of information through out it's life cycle. It is modified through appropriate means.

Smart cards are most popular form of authentication credentials currently used because cryptographic keys and other secrets on the cards are protected and difficult to steal.

Biometric authentication is the automated form of recognising a person based on it's behavior or physiological traits.

GrogVix [38]4 years ago
6 0

Answer:

1. True

2. True

3. False

4. False

Explanation:

1. Information integrity is a term in computer business that describes the degree of accuracy, reliability and dependency of an information content, process and system.

The main purpose of Information integrity is to prevent or protect information from accidental or intentional but unauthorized changes.

Hence, it helps to ensure that data can be modified only by appropriate mechanism.

2. Pairing threats with vulnerabilities is a pair of risk analysis, that sets to determine the type of vulnerabilities a system or organization has, which can be paired with valid threats. Hence, the kind of risk involved in the vulnerability threats, can then be addressed.

3. Knowledge based identification (authentication) system which involves password or PIN are the most common form of authentication methods. Ranges from different devices such as phones and PC to platform such as website.

4. Biometric is a type of user authentication that relies on the measurement and calculation of the shape of the body, such as fingerprint, palm veins, face recognition, DNA, palm print, hand geometry, iris recognition, retina and odour/scent. It is often referred to as Physiological characteristics of Biometric system.

You might be interested in
Which two components help input data in a computer and select options from the screen, respectively?
Natali [406]

Answer:

Mouse and Keyboard are the devices which can be used to give input to the computer.

Explanation:

Mouse and Keyboard both are connected with the CPU via USB cable. Mouse consists of 3 major buttons, left button(for click to get the task to be done), right button (to get options) and wheel (to scroll up and down the page on screen). Keyboard is use to type text and letters as per need.

3 0
3 years ago
Which statement below is inaccurate? a. Web 2.0 is a simple static website without any interaction with its users b. Web 2.0 bri
arsen [322]

Web 2.0 is a simple static website without any interaction with its users is inaccurate. This statement is accurate in web 1.0 and not 2.0

Further Explanation:

Web 1.0 is considered as the read-only web and represents the 1st implementation of the WWW. It allowed users to look for information online without offering an opportunity to fully interact with its pages. You only got the opportunity to passively read the content and that was it. The pages were static and were sometimes hosted on a free web hosting service.

Web 2.0 offers an interaction with its users. It is the read-write web technology as Berners-Lee would put it and it offers interoperability to its clients. It is what we interact with so much in our day-to-day lives. Examples of web 2.0 are the Wiki, FB, Twitter, and many more. These examples shows us how web 2.0 brings people closer together with information using machines and encourages participation and sharing of information.

Web 3.0 is not commonly used and is known to may as the future web. It is what many refer to as “IOT” or the semantic web. The world is slowly trying to transition into web 3.0 with smart devices trying to connect to the internet. It is trying to alter the web that humans are familiar with into some sort of database. It the web for the foreseeable future.

Learn more about web 2.0

brainly.com/question/10313994

#LearnWithBrainly

7 0
3 years ago
Engineers use science to ______ things that people use.
jek_recluse [69]

Answer:

Not 100% sure but I think it is either to solve things that people use or improve things that people use

Explanation:

8 0
3 years ago
A major concern about ESP claims is that proponents explain both the positive and negative findings. By explaining the negative
4vir4ik [10]

Answer: Falsifiability

Explanation: Falsifiability is the term that is defined as the evaluation of any particular hypothesis or theory to be proven wrong .This feature gives the access that the theory can be tested and have more accurate claims .

The ESP(Extrasensory perception) theory  can also have feature of being falsifiable because the experiments and test lead to the issue that the negative effects of the theory are not certain which might occur due to simple observation of effects.

5 0
4 years ago
A network technician has configured a point-to-point interface on a router. Once the fiber optic cables have been run, though, t
masya89 [10]

Answer:

Wavelength Mismatch

Explanation:

Optical fiber cables are used because they have lowest attenuation(loss of signal strength).

Attenuation is directly proportional to wavelength.

According to me this issue is most likely caused by Wavelength mismatch.If the wavelength of the signal is high then there is more attenuation in that signal.

6 0
3 years ago
Other questions:
  • Lana is trying to insert a table, but she does not like any standard table options that she is given. Which best describes what
    5·2 answers
  • You have a number of digital pictures you recently took on your smartphone. You would like to share these pictures with all of y
    11·1 answer
  • You are assigned to modify an existing Webpage by adding several tables that contain precise wording. The Webpage has had severa
    14·1 answer
  • Change the shape fill color to Dark Red. It is the first option in the Standard Colors section of the color palette.
    13·1 answer
  • Which of the following is the key benefit is offered by the Internet channel? Group of answer choices Deeper assortments Immedia
    7·1 answer
  • Can somebody help I need it now please and thank you correct answer please
    10·2 answers
  • A software team is setting an automation strategy and begins by identifying business processes that could benefit from automatio
    12·1 answer
  • First time using this site so be mindful if I make any mistakes
    6·1 answer
  • What network security tool, usually included with Kali Linux, allows a user to ping multiple IP addresses
    8·1 answer
  • explain how principles of computational thinking skills are applied in finding solutions that can be interpreted into software a
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!