Which of the following policies includes checking background and references, verifying educational records, and requiring employees to sign nondisclosure agreements?

a. Employee hiring and termination policy
b. Privacy policy
c. Employee identification policy
d. Help desk procedures and password change policy


ANS: A

Computer Science & Information Technology

You might also like to view...

What is returned by the function two defined below for the call two (13); ?

``` int two (int n) { int ans; if (n == 1) ans = 0; else ans = 1 + two (n / 2); return ans; } ```

Computer Science & Information Technology

Desktop publishing software enables you to create newsletters and annual reports.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A(n) _____ consists of a set of definitions that allow programmers to use the functions while hiding the implementation.

A. ADT B. atomic data item C. composite data item D. scalar data item

Computer Science & Information Technology

Case Based Critical ThinkingKatie wants to be sure that her designers are using InDesign as effectively as possible. Though she doesn't want them to rush through their jobs, she does want them to utilize the software to its fullest effect. Katie's team is working on a layout for a page in which animal images are on the bottom layer on the Layers panel. On the top layer are images of trees, and the layout calls for all the animals to be hiding behind the trees. The client would like only the horse image to appear in front of the trees. The designer selects the horse image then applies the Bring To Front command, and is then confused because the image is still behind the trees. This designer is confused by which component of working with layered artwork?

A. The Bring To Front command vs the Send To Back command B. The Stacking Order vs the order of layers on the Layers panel C. Working with locked layers D. Working with hidden layers

Computer Science & Information Technology