Answer:
The answer to this question is given below in the explanation section.
Explanation:
An electronic form uses input fields in which the user can enter data from their own computer and then transmit the form back to the company - (True)
Yes, it is true, because an electronic form that contains input fields which is used to collect data from the user. The input fields in the electronic form are based on the requirement of the organization about what they want to collect from their user.
For example, when you signup on google account, google company wants to know about your authentication. So the user enters the data in input fields such as first name, last name, phone number etc. When the user clicks on the submit or signup button, all these input values are then transmitted back to the company (google).
The answer is C) Availability.
Although the company is addressing scalability by adding more servers, the question is asking for security requirement. Therefore we need to choose one of the principles from CIA triad which includes confidentiality, integrity, and availability.
Integrity involves keeping the data accurate and confidentiality involves keeping the data between the sender and intended recipient(s). That being said, scalability and availability are the possible answers.
C) Availability is the best answer because it is part of the CIA triad.
Note: Another resource to look at for cyber security principles would be the Parkerian Hexad.
Answer:
The only element visible is the presentation itself.
Explanation:
All of the other options, such as presenter's assistance, is hidden away from the projector, presentation device, etc. You are the only one that can see the window that shows what slide is next, presenter's notes, etc. <u>In other words, whatever you want the audience to see, that is only what they will see and nothing else.</u>