Computer Science
Assertion (A): Privacy of sensitive data can be achieved through proper authentication checks.
Reasoning (R): Authentication is the process of providing access to the data for all the users.
- Both A and R are true and R is the correct explanation of A.
- Both A and R are true but R is not the correct explanation of A.
- A is true but R is false.
- A is false but R is true.
Computing Safety & Ethics
1 Like
Answer
A is true but R is false.
Explanation
Privacy of sensitive data can be implemented by encryption, authentication and other secure methods to ensure that such data is accessible only to the authorized user and is for a legitimate purpose. Authentication is the process of verifying the identity of users and granting access only to those who are authorized.
Answered By
1 Like
Related Questions
Which of the following is not a type of a cyber crime?
- Data theft
- Forgery
- Damage to data
- Installing antivirus for protection
Assertion (A): Digital footprints are also termed as Digital Tattoos.
Reasoning (R): Digital footprints are the records and traces that we leave behind while working with the internet.
- Both A and R are true and R is the correct explanation of A.
- Both A and R are true but R is not the correct explanation of A.
- A is true but R is false.
- A is false but R is true.
Assertion (A): FLOSS is an Open Source Software.
Reasoning (R): FLOSS source code is freely available and modifiable.
- Both A and R are true and R is the correct explanation of A.
- Both A and R are true but R is not the correct explanation of A.
- A is true but R is false.
- A is false but R is true.
Assertion (A): One should not use copyrighted material without taking a license first.
Reasoning (R): A license is described as the permission granted by the copyright holder to use a product.
- Both A and R are true and R is the correct explanation of A.
- Both A and R are true but R is not the correct explanation of A.
- A is true but R is false.
- A is false but R is true.