20. £¨ £©, technological and managerial procedures applied to computer systems to ensure the availability, integrity and confidentiality of information managed by the computer system.
A. Computer Security
B. Digital signatures
C. Computer virus
D. none of the above
(ÔðÈα༣ºadmin)ÒªÕâ´ð°¸¼ÓQQ£º800020900 »ò¼Ó΢ÐÅ£ºvq800020900 »ñÈ¡