When performing inventory on software packages, which of the following is not something that should be inventoried??
A. ?version number
B. ?vendor
C. ?licensing
D. ?proprietary source code
Answer: D
Computer Science & Information Technology
You might also like to view...
The process of implementing network security starts with ____.
A. documentation B. evaluation C. assessment D. architecture
Computer Science & Information Technology
To view all the updates from all the Facebook Pages you've ________, you need to display the special Pages Feed
A) created B) edited C) viewed D) liked
Computer Science & Information Technology
To make changes to an object that has been embedded in a document, you must make them in ________
A) both the source file and the destination file B) the destination file C) the source file D) the source program
Computer Science & Information Technology
The following statement is an example of chaining methods together.fruit.sort.reverse.inspect
Answer the following statement true (T) or false (F)
Computer Science & Information Technology