____ ensures that the information is correct and that no unauthorized person or malicious software has altered it.

A. Integrity
B. Availability
C. Confidentiality
D. Access control

Answer: A

Computer Science & Information Technology

You might also like to view...

The process of copying data from one source or application to another is ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

A(n) ________ is a method used to organize text into levels of importance in a structure

Fill in the blank(s) with correct word

Computer Science & Information Technology