A process is identified by
A. the name of the program being run
B. an integer
B. an integer
Computer Science & Information Technology
You might also like to view...
Which of the following is not part of the three-step auditing process?
A. Enabling auditing for files. B. Turning on and auditing policy. C. Evaluating the system log. D. Reviewing the security log.
Computer Science & Information Technology
A __________ is a device that allows a computer, which works with digital information, to communicate over lines that use analog signals.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
An effective information security governance program requires no ongoing review once it is well established.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
Copyright protection lasts 20 years after the date of publication or release.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology