Verifying that users are who they say they are and that each input arriving at the system came from a trusted source is _________ .

A) authenticity
B) credibility
C) accountability
D) integrity

A) authenticity

Computer Science & Information Technology

You might also like to view...

To make changes to data in a form, you must be viewing the form in ________ view

Fill in the blank(s) with correct word

Computer Science & Information Technology

Case 8-2 Another colleague shares the following code with you:  Dim strEmployees(50) As String ' Later in the code ReDim strEmployees(65). Which of the following is NOT true based on what you see in your colleague's code?

A. The strEmployees array originally is sized to hold 51 values. B. The strEmployees array is reinitialized to hold 66 values. C. If the array had been redimensioned to a smaller size, your colleague would not lose the items between the original upper-bound array size and the new smaller upper-bound array size. D. When the array is redimensioned, all the data contained in the array is lost.

Computer Science & Information Technology