____ refers to the efforts taken through policy, procedure, and design in order to create and maintain the privacy and discretion of information and systems.
A. Availability
B. Confidentiality
C. Portability
D. Integrity
Answer: B
Computer Science & Information Technology
You might also like to view...
An amortization table shows the interest rate for each payment
Indicate whether the statement is true or false
Computer Science & Information Technology
Ujam is ____________ that uses ________ to produce sophisticated harmonies, bass lines, drum tracks, horn parts, etc.
A. hardware; algorithms B. hardware; instinct C. software; algorithms D. software; instinct
Computer Science & Information Technology