Which type of policy defines the actions users may perform while accessing the network?
A. acceptable use policy
B. password policy
C. system-specific policy
D. physical device policy
Answer: A
Computer Science & Information Technology
You might also like to view...
Joe is working in a database that stores client data. He needs to design a field that will assign a client ID number each time a user enters a new client. The data type he should apply to this field is:
A) Number B) Text C) Memo D) AutoNumber
Computer Science & Information Technology
The position of the lines of a paragraph relative to the page margins is the:
A) line spacing. B) indent. C) orientation. D) page layout.
Computer Science & Information Technology
A group of related data values to be charted are called data points
Indicate whether the statement is true or false
Computer Science & Information Technology
To check whether an XML document is well formed, you would use a(n) ____________________.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology