The ____ sets a specific period of time to retain each record type, after which that particular record is erased from the system or archived in places that are difficult to access.

A. data access policy
B. data security policy
C. data retention policy
D. data loss policy


Answer: C

Computer Science & Information Technology

You might also like to view...

Discuss whether professional engineers should be certified in the same way as doctors or lawyers.

What will be an ideal response?

Computer Science & Information Technology

This is an all-in-one solution that integrates a wide range of security features into one appliance. For example, it may have a combination of firewall, network IDS/IPS, VPN, gateway anti-virus, gateway anti-spam, load balancing and content filtering.

What will be an ideal response?

Computer Science & Information Technology

If A is derived from B, and B is derived from C, B has a virtual function, will this function be dynamically binded?

A. No B. Yes

Computer Science & Information Technology

In most tables, one of the fields uniquely identifies each record and is called the ____.

A. exception B. foreign key C. primary key D. cell

Computer Science & Information Technology