A process is identified by

A. the name of the program being run
B. an integer


B. an integer

Computer Science & Information Technology

You might also like to view...

Which of the following is not part of the three-step auditing process?

A. Enabling auditing for files. B. Turning on and auditing policy. C. Evaluating the system log. D. Reviewing the security log.

Computer Science & Information Technology

A __________ is a device that allows a computer, which works with digital information, to communicate over lines that use analog signals.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

An effective information security governance program requires no ongoing review once it is well established.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Copyright protection lasts 20 years after the date of publication or release.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology