1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
barxatty [35]
4 years ago
9

1. Information integrity ensures that data can be modified only by appropriate mechanisms.

Computers and Technology
2 answers:
maks197457 [2]4 years ago
8 0

Answer:

1 is True.

2 is true

3 is false

4 is false.

Explanation:

Information integrity refers to accuracy and consistency of information through out it's life cycle. It is modified through appropriate means.

Smart cards are most popular form of authentication credentials currently used because cryptographic keys and other secrets on the cards are protected and difficult to steal.

Biometric authentication is the automated form of recognising a person based on it's behavior or physiological traits.

GrogVix [38]4 years ago
6 0

Answer:

1. True

2. True

3. False

4. False

Explanation:

1. Information integrity is a term in computer business that describes the degree of accuracy, reliability and dependency of an information content, process and system.

The main purpose of Information integrity is to prevent or protect information from accidental or intentional but unauthorized changes.

Hence, it helps to ensure that data can be modified only by appropriate mechanism.

2. Pairing threats with vulnerabilities is a pair of risk analysis, that sets to determine the type of vulnerabilities a system or organization has, which can be paired with valid threats. Hence, the kind of risk involved in the vulnerability threats, can then be addressed.

3. Knowledge based identification (authentication) system which involves password or PIN are the most common form of authentication methods. Ranges from different devices such as phones and PC to platform such as website.

4. Biometric is a type of user authentication that relies on the measurement and calculation of the shape of the body, such as fingerprint, palm veins, face recognition, DNA, palm print, hand geometry, iris recognition, retina and odour/scent. It is often referred to as Physiological characteristics of Biometric system.

You might be interested in
Does anyone know the answer for question d (questions in the picture btw)
VashaNatasha [74]
Yessssss bdbfbfbsjebfjcjde
6 0
3 years ago
What are midi signals
gregori [183]

Answer: is a unified standard used when recording the sounds of instruments

3 0
3 years ago
Read 2 more answers
1. Software used to search a database using keywords or phrases entered by the user.
vladimir1956 [14]

Answer:

1 C

2 D

3 B

4 A

5 D

6 B (the question should state software that manages ...)

7 D

8 C

9 A

10 B

11 C

12 D

13 B

Explanation:

6 0
3 years ago
Define an iterative function named append_ordered; it is passed two arguments: a linked list (ll) whose values are ordered from
enot [183]

Answer:

A python programming language (code) was used for this exercise.

The code is shown below in the explanation section

Explanation:

Solution

Python code:

class LN:

def __init__(self,value,next=None):

self.value = value

self.next = next

  def list_to_ll(self,l):

if l == []:

return None

front = rear = LN(l[0])

for v in l[1:]:

rear.next = LN(v)

rear = rear.next

return front

  def str_ll(self,ll):

answer = ''

while ll != None:

answer += str(ll.value)+'->'

ll = ll.next

return answer + 'None'

def append_ordered(self,ll,v):

ln1=LN(v); #create a node with the new value by creating an instance of the LN class

if ll is None: #if the linked list is empty

ll=ln1 #return the new created node

elif(ll.value >= ln1.value): #if the value to be add is smallest, append the linked list to it

ln1.next=ll

ll=ln1

else:

current=ll; #crate a temporary pointer to iterate over linked list

#iterate till the next node value is smaller than the new value and list is not over

while (current.next is not None and current.next.value < ln1.value):

current=current.next

ln1.next=current.next #save the current node in the next of the new node

current.next=ln1 #save new node in the next of current node

return ll

ln=LN(0); #create an instance of class LN

ll1=ln.list_to_ll([1,2,4,5]); #create a linked list of the list

answer=ln.str_ll(ll1);    

print(answer); #print the linked list

ll2=ln.append_ordered(ll1,3); #append the value 3 in the linked list

answer=ln.str_ll(ll2)

print(answer); #print the new linked list

Now,

  • If Linked list is empty then make the node as head and return it.
  • If value of the node to be inserted is smaller than value of head node, then insert the node at start and make it head.
  • In a loop, find the appropriate node after which the input node ( 10 ) is to be inserted.To find the appropriate node start from head,keep moving until you reach a node GN (12 ) who's value is greater than the input node. The node just before GN is the appropriate node (8).
  • Insert the node (10) after the appropriate node (8) found in step 3.

Note: Kindly find the output python code attached to the question below.

3 0
3 years ago
Based on a kc value of 0.150 and the data table given, what are the equilibrium concentrations of xy, x, and y, respectively?
lidiya [134]

If the solution process is endothermic, then an increase in temperature usually results in an increase in solubility. Their heat of reaction is usually positive. The rest of the choices do not answer the question above.

4 0
3 years ago
Other questions:
  • How would this requirement be implemented?
    12·1 answer
  • A​ ___________ identifies the content and purpose of the​ visual, along with whatever label and number​ you're using to refer to
    15·1 answer
  • What is the generic term for a mode or method of malware infection?
    8·1 answer
  • In most programming languages, the compiler carries a preprocessing step to determine if certain statements will compile. For in
    7·1 answer
  • What is computer? Write is features <br><br><br><br><br>​
    14·1 answer
  • What kind of files are automatically blocked in outlook?
    7·1 answer
  • 8. Assuming str(rate) is "7.25," what output would be produced by the following snippet:
    15·1 answer
  • 3. Find the best.
    13·1 answer
  • Which wireless technology will John use to provide wide-range cellular service that focuses on indoor coverage, low cost, long b
    13·1 answer
  • When conducting memory and recall tests, some people make an effort to normalize memories by not reporting extreme cases. this l
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!