In determining whether a system is adequately protected from attacks by computer viruses, all of the following policies are relevant except
a. the policy on the purchase of software only from reputable vendors
b. the policy that all software upgrades are checked for viruses before they are implemented
c. the policy that current versions of antivirus software should be available to all users
d. the policy that permits users to take files home to work on them
D
You might also like to view...
Which of the following categories of investments can be both debt and equity securities?
a. Available-for-sale securities b. Trading securities c. Held-to-maturity securities d. Both available-for-sale and trading securities
Which of the following is NOT a type of pricing objective?
A) elasticity B) market share C) profit D) competitive effect E) image enhancement
Max buys shares of newly issued Z Corp stock for $30 per share and pays $1,000 cash, a car worth $2,000, and a promissory note for $3,000 . Under the Revised Act, how many shares of stock could validly be sold?
a. 100 b. 33 c. 200 d. 133
Leaning backward or gesturing with palms facing up communicate ________, a term used to represent availability for communication.
A. liking B. boredom C. immediacy D. happiness E. sorrow