Jade has planned to open a new cosmetics shop.Before starting her business, she wishes to identify and analyze her potential customers. Jade can obtain the required information from _____ databases.

A. ?government
B. ?marketing
C. ?finance
D. ?property


Answer: B

Computer Science & Information Technology

You might also like to view...

By default, the hardware clock is set to ____.

A. Universal Time Coordinated (UTC) B. Greenwich Mean Time C. European Union Time D. United States Military Time

Computer Science & Information Technology

Match each term with the correct statement below.

A. taking advantage of a vulnerability B. the storage area in which SNMP software agents store their data C. a type of action that has the potential to cause harm D. a systematic and methodical evaluation of the exposure of assets to attackers, forces of nature, or any other entity that is a potential harm E. a policy that defines the actions users may perform while accessing systems and networking equipment F. the task of identifying and categorizing assets G. adjustments to a WLAN performed as part of routine maintenance H. a record of events I. the likelihood that a threat agent will exploit a vulnerability J. a flaw or weakness that allows a threat agent to bypass security

Computer Science & Information Technology

Bulk mail is sorted by ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

Windows XP has a default background picture

Indicate whether the statement is true or false

Computer Science & Information Technology