Information( )means protecting information and information systems from unauthorized acces,use, disclosure, disruption, modification, or destruction.A.integrityB.availabilityC.securityD.consistency

Information( )means protecting information and information systems from unauthorized acces,use, disclosure, disruption, modification, or destruction.

A.integrity
B.availability
C.security
D.consistency

参考解析

解析:

相关考题:

●One use of networks is to let several computers share (75) such as file systems,printers,and tape drives.(75) A.CPUB.memoryC.resourcesD.information

Information is no good to you if you cant( )it. The location dimension of information means having access to information no matter where you are.A.accessB.makeC.learnD.bring

要查询INFORMATION表中姓“王”且日£名的学生情况。可以用下列哪个命令?…A.SELECT*FROM INFORMATION WHERE姓名=‘王--’B.SELECT*FROM INFORMATION WHERE姓名LIKE‘王%’C.SELECT*FROM INFORMATION WHERE姓名=‘王%’D.SELECT*FROM INFORMATION WHERE姓名LIKE‘王_’

One use of networks is to let several computers share(75)such as file systems, printers, and tape drives.A.CPUB.memoryC.resourcesD.information

The presentation layer is concerned with the(71) and semantics of the information exchanged between two systems.The processes in two systems are usually exchanging information in the form. of character (72) numbers, and so on.The information should be changed to bit (73) before being transmitted.Because different computers use different encoding systems, the presentation layer is responsible for (74) between these different encoding methods.The presentation layer at the sender changes the information from its sender-dependent format into a common format. The presentation layer at the receiving machine changes the common format into its (75) dependent format.(71)A.frequencyB.syntaxC.dialogD.format(72)A.numbersB.unctionsC.stringsD.codes(73)A.systemsB.charactersC.layersD. streams(74)A.capabilityB.interoperabilityC.reliabilityD.dependability(75)A.receiverB.userC.serverD. customer

The Internet is an open system,and most information is available to everyone.It is very important to add(74)to existing system for protecting the secret information.A.Web pagesB.modemC.securityD.network

Information is no good to you if you can’t(72)it . The location dimension of information means having access to information no matter where you are.A.accessB.makeC.learnD.bring

The Internet is an open system, and most information is available to everyone.It is very important to add ______ to existing system for protecting the secret information.A.Web pagesB.modemC.securityD.network

Computer( )focuses on protecting information ,hardware ,and software from unauthorized use and damage.A.network B.virus C.security D.architecture

Computer ( ) focuses on protecting information,hardware,and software,and software from unauthorized use and damade.A.network B.virus C.security D.architecture

Automatic identification systems(AIS)are required to ______.A.provide safety-related information automatically to shore stations,other vessels and aircraftB.receive safety-related information automatically from similarly equipped vesselsC.exchange safety-related information with shore-based facilitiesD.All of the above

Information is no good to you if you can't ( ) it.The location dimension of information means having access to access to information no where you are. A.accessB.make C. learnD. bring

Computer ( ) focuses on protecting information, hardware, and software from unauthorized use and damage.A.networkB.vimsC.securityD.architecture

Computer ( ) focuses on protecting information, hardware, and software from unauthorized use and damage.A. networkB. vimsC. securityD. architecture

Computer______focuses on protecting information,hardware,and software from unauthorized use and damage.A.networkB.virusC.securityD.architecture

System and application access control is to prevent( )access to systems and applications.Access to information and application system functions shall be restricted in accordance with the access control policy.A.physicalB.specialC.authorizedD.unauthorized

The term computer describes a device made up of a combination of electronic components.By itself, a computer has no ( ) and is referred to as hardware, which means simply the physical equipment. The hardware can't be used until it is connected to other elements, all of which constitute the six parts of a computer-based information system,hardware,software,data/information, people, procedures and communications. A system is defined as a collection of related components that ( ) to perform a task in order to accomplish a goal. Any organization that uses information technology will have a computer-based information system to provide managers (and various categories of employees with the appropriate kind of information to help them make decisions. Systems analysis and design is to ascertain how a system works and then take steps to make it ( ) Often, a system approach is used to define, describe, and solve a problem or to meet a(an)( ) From time to time, organizations need to (5 ) their information systems, in, response to new marketing' opportunities, modified government regulations, the introduction .of new technology, merger with another company, or other developments. When change is needed, the time is ripe for applying the principles of systems analysis and design.(5)应选( )。 A. modifyB. replaceC. ChangeD. transfer

The term computer describes a device made up of a combination of electronic components.By itself, a computer has no ( ) and is referred to as hardware, which means simply the physical equipment. The hardware can't be used until it is connected to other elements, all of which constitute the six parts of a computer-based information system,hardware,software,data/information, people, procedures and communications.A system is defined as a collection of related components that (请作答此空) to perform a task in order to accomplish a goal. Any organization that uses information technology will have a computer-based information system to provide managers (and various categories of employees with the appropriate kind of information to help them make decisions.Systems analysis and design is to ascertain how a system works and then take steps to make it ( ) Often, a system approach is used to define, describe, and solve a problem or to meet a(an)( )From time to time, organizations need to ( )their information systems, in, responseto new marketing' opportunities, modified government regulations, the introduction .of new technology, merger with another company, or other developments. When change is needed, the time is ripe for applying the principles of systems analysis and design.A.interactB.workC.connectD.change

()is a discipline within the information technology and information systems domain and is concerned with making the planning process for information technology investments and decision-making a quicker,more flexible,and more thoroughly aligned process. A. Information technology planning B. Service monitor managementC. Service designD. Information technology audit

In terms of information literacy, an information literate student is able to()A、determine the nature and extent of the information needed and access needed information effectively and efficiently.B、evaluate information and its sources critically and incorporate selected information into his or her knowledge base and value system.C、use information effectively to accomplish a specific purpose individually or as a member of a group.D、understand many of the economic,legal,and social issues surrounding the use of information and access and use information ethically and legally.

Management of Information is one of the seven requirements in Global minimum essential requirements(GMER)in medical education, which requires a medical practitioner to be able to()A、search,collect,organize and interpret health and biomedical information from different databases and sources.B、retrieve patient-specific information from a clinical data system.C、use information and communication technology to assist in diagnostic,therapeutic and preventive measures,and for surveillance and monitoring health status.D、understand the application and limitations of information technology.

You are the network consultant from passguide.com. In which situation you will advice your customer to implement data centers?()A、Protecting the business from information outagesB、Optimizing the efficiency with which IT operatesC、An increased need for specialized IT silosD、IT systems grow fast

You need to design a migration strategy to migrate public folders from the existing Exchange Server 5.5 environment to the Exchange Server 2003 environment. What should you do?()A、Install and configure the Exchange utility. Use the utility to migrate and import all calendar information into each new mailboxB、Install and configure the InterOrg Replication Utility. Use the utility to migrate public folder information from Exchange Server 5.5 to Exchange Server 2003C、Install and configure a public folder connection agreement. Use this agreement to migrate the public folder information from Exchange Server 5.5 to Exchange Server 2003D、Run the pfmigrate command to migrate the public folder information from Exchange Server 5.5 to Exchange Server 2003

单选题A navigator fixing a vessel’s position by radar ().Acan use radar information from one object to fix the positionBshould never use radar bearingsCshould only use radar bearings when the range exceeds the distance to the horizonDmust use information from targets forward of the beam

单选题Automatic identification systems(AIS)are required to().Aprovide safety-related information automatically to shore stations,other vessels and aircraftBreceive safety-related information automatically from similarly equipped vesselsCexchange safety-related information with shore-based facilitiesDAll of the above

单选题Which of the following is NOT an advantage of computer newspapers?AThey are cheaper than traditional newspapers.BThey are very convenient to use.CYou can get more information from them quickly.DYou can easily save information for future use.

多选题In terms of information literacy, an information literate student is able to()Adetermine the nature and extent of the information needed and access needed information effectively and efficiently.Bevaluate information and its sources critically and incorporate selected information into his or her knowledge base and value system.Cuse information effectively to accomplish a specific purpose individually or as a member of a group.Dunderstand many of the economic,legal,and social issues surrounding the use of information and access and use information ethically and legally.