From a security point of view, which of the following actions should be done upon the termination of an employee?

A. remove the person’s name from all lists of authorized access
B. recover all assets, including employee ID, disks, documents and equipment
C. remove all personal access codes
D. all of the above


D. all of the above

Computer Science & Information Technology

You might also like to view...

Complete and fully test the class Characteristic that Exercise 5 describes. Include the following methods:

• getDescription—returns the description of this characteristic. • getRating—returns the rating of this characteristic. • getCompatability(Characteristic otherRating)—returns the compatibility measure of two matching characteristics, or zero if the descriptions do not match. • getCompatibilityMeasure(Characteristic otherRating)—a private method that returns a compatibility measure as a double value using the formula .when both ratings are nonzero; m is zero if either rating is zero. (Recall from Exercise 5 that the constructor sets the rating to zero, indicating that it has not yet been determined.) • isMatch(Characteristic otherRating)—a private method that returns true if the descriptions match. This project is a continuation of Exercise 5. It adds methods that allow one to determine a numeric score for compatibility. Test cases are in the main method.

Computer Science & Information Technology

Fill in the missing step in the following deadlock situation. Two users from the local board of education are each running a program (P1 and P2), and both programs will eventually need two DVD drives to copy files from one disc to another. Only two DVD-R drives are available and they're allocated on an "as requested" basis. Soon the following sequence transpires:1. P1 requests drive 1 and gets it.2. ____3. P1 requests drive 2 but is blocked.4. P2 requests drive 1 but is blocked.

A. P1 requests drive 2. B. P2 requests drive 2 and gets it. C. P2 requests drive 1 but is blocked. D. P1 releases drive 1.

Computer Science & Information Technology

With the database approach, the data is independent of the programs that access the data.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Given a variable containing the value 0x06, which statement shown below results in the value 0x60?

A. var << 2 B. var << 4 C. var >> 2 D. var >> 4 E. var & 9

Computer Science & Information Technology