Data that is entered and stored according to its intended use is said to have data:
A) integrity. B) reliability. C) consistency. D) validity.
A
You might also like to view...
A threat to the use of instant messaging is a phenomenon known as ________.
a. spamming b. spimming c. phishing d. e-mailing
Answer the following statements true (T) or false (F)
1. As with Playfair, the strength of the Hill cipher is that it completely hides single letter frequencies. 2. A scheme known as a one-time pad is unbreakable because it produces random output that bears no statistical relationship to the plaintext. 3. The one-time pad has unlimited utility and is useful primarily for high-bandwidth channels requiring low security. 4. The most widely used cipher is the Data Encryption Standard. 5. Steganography renders the message unintelligible to outsiders by various transformations of the text.