When performing inventory on software packages, which of the following is not something that should be inventoried??

A. ?version number
B. ?vendor
C. ?licensing
D. ?proprietary source code


Answer: D

Computer Science & Information Technology

You might also like to view...

The process of implementing network security starts with ____.

A. documentation B. evaluation C. assessment D. architecture

Computer Science & Information Technology

To view all the updates from all the Facebook Pages you've ________, you need to display the special Pages Feed

A) created B) edited C) viewed D) liked

Computer Science & Information Technology

To make changes to an object that has been embedded in a document, you must make them in ________

A) both the source file and the destination file B) the destination file C) the source file D) the source program

Computer Science & Information Technology

The following statement is an example of chaining methods together.fruit.sort.reverse.inspect

Answer the following statement true (T) or false (F)

Computer Science & Information Technology