____ ensures that the information is correct and that no unauthorized person or malicious software has altered it.
A. Integrity
B. Availability
C. Confidentiality
D. Access control
Answer: A
Computer Science & Information Technology
You might also like to view...
The process of copying data from one source or application to another is ________
Fill in the blank(s) with correct word
Computer Science & Information Technology
A(n) ________ is a method used to organize text into levels of importance in a structure
Fill in the blank(s) with correct word
Computer Science & Information Technology