COGNITIVE ASSESSMENT
Which of the following terms refers to a written list of guidelines that might include rules that prevent employees from using software illegally or using computers to steal?

A. a software license
B. an IT code of conduct
C. digital rights management
D. fair use


Answer: B

Computer Science & Information Technology

You might also like to view...

Which of the following statements does not alter the value stored in a memory location?

a. int a; b. number = 12; c. y = y + 2; d. width = Integer.parseInt(input);

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

1. A C-string variable with a something in it is always filled with characters. 2. It is illegal to write ``` char message[] =”Go Home!”; ``` 3. A C-string variable is an array, so it can be indexed to access individual character positions (indexed variables of type character). 4. A C-string is a sequence of characters terminated by the null character.

Computer Science & Information Technology

To create a triangle, use the ____________________ tool.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

DML triggers are used to ________.

maliciously attack databases produce automatic responses if the data of the database has been altered Both maliciously attack databases and produce automatic responses if the data of the database has been altered Neither maliciously attack databases nor produce automatic responses if the data of the database has been altered

Computer Science & Information Technology