Q. Data integrity gets compromised when and are taken control off. (Solved)
1. access control, file deletion
2. network, file permission
3. access control, file permission
4. network, system
- c. access control, file permission
1. access control, file deletion
2. network, file permission
3. access control, file permission
4. network, system