Hard disks are read/write storage media.

Answer the following statement true (T) or false (F)


True

Computer Science & Information Technology

You might also like to view...

Which of the following best describes the accountability key information security principle?

A) The logging of access and usage of information resources B) The configuring of the Security log to record events C) The process of tracing actions to their source D) The process of identifying users who seek access to secure information

Computer Science & Information Technology

All of the following are true about a macro in Word EXCEPT ________

A) it automates repetitive tasks B) it can record your keystrokes C) it can only be used once D) it can be deleted

Computer Science & Information Technology

An effective filename should identify the types of files stored in the folder

Indicate whether the statement is true or false

Computer Science & Information Technology

Which of the following is not one of the three parts of the CIA triad?

A. Availability B. Encryption C. Integrity D. Confidentiality

Computer Science & Information Technology