COGNITIVE ASSESSMENT
What identifies data outside of a normal condition?
A. exception criteria
B. detailed report
C. exception report
D. summary report
Answer: C
You might also like to view...
All of the following are methods to protect a computer from theft EXCEPT ________
A) carefully safeguarding a portable computer when traveling B) placing identification tags on the system unit and monitor C) securing the computer to the desk or table with cables and locks D) controlling access to computer labs
The statements below are known as ____.lastName = "Vanderkolk"firstName = "Monica"hoursWorked = 40payRate = 15.00grossPay = hoursWorked * payRate
A. variables B. assigment statements C. statement declarations D. literals
The chief security officer (CS0) has issued a new policy that requires that all internal websites be configured for HTTPS traffic only. The network administrator has been tasked to update all internal sites without incurring additional costs.Which of the following is the best solution for the network administrator to secure each internal website?
A. Use certificates signed by the company CA B. Use a signing certificate as a wild card certificate C. Use certificates signed by a public ca D. Use a self-signed certificate on each internal server
Which of the following is false?
a) Arrays can be maintained in sorted order. b) Linked lists can be maintained in sorted order. c) Insertion and deletion in a sorted array (while maintaining sorted order) is efficient. d) Once the insertion point or the node to be deleted has been located, insertion or deletion in a sorted linked list (while maintaining sorted order) is efficient.