?When there are no system problems to be corrected or authorized enhancements to be made, access to the operational environment is limited to _____ and must strictly be controlled.
A. ?systems analysts
B. ?users
C. ?programmers
D. ?managers
Answer: B
Computer Science & Information Technology
You might also like to view...
What are the six goals of HCI? Describe each one.
What will be an ideal response?
Computer Science & Information Technology
The formula result displaying in a cell will be in decimal format when dividing an amount by a total
Indicate whether the statement is true or false
Computer Science & Information Technology
In the accompanying figure, you can enter BC76 in the ____ row of the Client Number field to find all clients whose client number is BC76.
A. Sort B. Show C. or D. Criteria
Computer Science & Information Technology
In which phase of the development of an InfoSec policy must a plan to distribute the policies be developed? Why is this important?
What will be an ideal response?
Computer Science & Information Technology