Question: ________ prevents unauthorized users from creating, modifying, or deleting information while _________ ensures that authorized users have timely and reliable access to necessary information. a.
________ prevents unauthorized users from creating, modifying, or deleting information while _________ ensures that authorized users have timely and reliable access to necessary information. a. Availability; concealability b. Integrity; availability c. Confidentiality; concealability d. Integrity; confidentiality e. None of these are correct
The _____ is a widely used method of visualizing and documenting software systems design. A _________ is one of its techniques that visually represents the interaction between users and an information system. In this technique, the user becomes a(n) _____, with a specific role that describes how he or she interacts with a system. a. Active Modeling Language (AML); use case story description; user agent b. Unified Modeling Language (UML); user-based flowchart; agent c. Unified Modeling Language (UML); use case diagram; actor d. Objective Oriented Modeling (OOM); user-based flowchart; object actor e. None of these are correct
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
