A simple scheme can allow an organization to protect sensitive information, such as marketing or research data, personnel data, customer data, and general internal communications classifies data. Which of the following categories would most likely be used for internal phone lists?
A. Public
B. For Official Use Only
C. Classified
D. Galatic Top Secret
Answer: B
You might also like to view...
In the object-oriented approach, a(n) __________ is an external view of the object that can be accessed by other objects.
a. method b. signal c. data structure d. operation
Which of the following assignment statements is correct?
a. char c = 'd'; b. char c = 100; c. char c = "d"; d. char c = "100";
Works no longer protected by some form of intellectual property law are in the private domain.
Answer the following statement true (T) or false (F)
____ implement software that simulates the movement of objects in the real world, which are affected by things like gravity and the collision of one object with another.
A. Graphics programmers B. Human-Computer Interaction programmers C. Physics programmers D. Data communications programmers