?When there are no system problems to be corrected or authorized enhancements to be made, access to the operational environment is limited to _____ and must strictly be controlled.

A. ?systems analysts
B. ?users
C. ?programmers
D. ?managers


Answer: B

Computer Science & Information Technology

You might also like to view...

What are the six goals of HCI? Describe each one.

What will be an ideal response?

Computer Science & Information Technology

The formula result displaying in a cell will be in decimal format when dividing an amount by a total

Indicate whether the statement is true or false

Computer Science & Information Technology

In the accompanying figure, you can enter BC76 in the ____ row of the Client Number field to find all clients whose client number is BC76.

A. Sort B. Show C. or D. Criteria

Computer Science & Information Technology

In which phase of the development of an InfoSec policy must a plan to distribute the policies be developed?  Why is this important?

What will be an ideal response?

Computer Science & Information Technology