subject
Computers and Technology, 25.02.2022 14:00 leo4687

1. Choose in each case that it affects which of the Information security requirements (confidentiality, integrity, availability) and justify your a. Someone has copied your credit card and CVV number.
b. If someone sends a message “Please come at 10 AM”, the receiver receives “Please come at 10.”
c. If the attacker has deleted the installed copy of the Microsoft Office application from your laptop.

ansver
Answers: 2

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 15:30
Which of the following examples has four beats in each measure?
Answers: 2
question
Computers and Technology, 23.06.2019 12:00
Which of these is a benefit of using objects in a powerpoint presentation? a. collaborators can create the external files while you create and edit the slide show. b. you can easily change the theme and design of the presentation. c. you can have older data in the source file while having up-to-date data in the presentation. d. collaborators can easily share the presentation.
Answers: 2
question
Computers and Technology, 24.06.2019 03:00
With editing, word automatically displays a paste options button near the pasted or moved text. a. cut-and-paste b. drag-and-drop c. inline d. copy-and-carry
Answers: 1
question
Computers and Technology, 24.06.2019 16:50
How many types of string types does python support?
Answers: 1
You know the right answer?
1. Choose in each case that it affects which of the Information security requirements (confidentiali...
Questions
question
Mathematics, 11.10.2020 22:01
question
Social Studies, 11.10.2020 22:01
question
Mathematics, 11.10.2020 22:01
question
Physics, 11.10.2020 22:01
question
History, 11.10.2020 22:01
Questions on the website: 13722359