A simple scheme can allow an organization to protect sensitive information, such as marketing or research data, personnel data, customer data, and general internal communications classifies data.  Which of the following categories would most likely be used for internal phone lists?

A. Public
B. For Official Use Only
C. Classified
D. Galatic Top Secret


Answer: B

Computer Science & Information Technology

You might also like to view...

In the object-oriented approach, a(n) __________ is an external view of the object that can be accessed by other objects.

a. method b. signal c. data structure d. operation

Computer Science & Information Technology

Which of the following assignment statements is correct?

a. char c = 'd'; b. char c = 100; c. char c = "d"; d. char c = "100";

Computer Science & Information Technology

Works no longer protected by some form of intellectual property law are in the private domain.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

____ implement software that simulates the movement of objects in the real world, which are affected by things like gravity and the collision of one object with another.

A. Graphics programmers B. Human-Computer Interaction programmers C. Physics programmers D. Data communications programmers

Computer Science & Information Technology