Which of the following should NOT be performed in an effort to protect the integrity of data?

A) Keep a backup of original data.
B) Whenever possible, keep data and the analysis of that data on the same worksheet.
C) Check data for completeness and accuracy.
D) Organize data within a workbook in a meaningful manner.


Answer: B

Computer Science & Information Technology

You might also like to view...

Which of the following is not a standard document property?

A. author B. date the presentation file was created or changed C. title D. subject

Computer Science & Information Technology

The ListIterator method that replaces an existing element with a new element is

A) set B) replace C) overwrite D) add

Computer Science & Information Technology

Pointers to pointers is a term used to describe

A. Any pointer that points to a variable. B. Any two pointers that point to the same variable. C. Any two pointers that point to variables of the same type. D. Pointers used as formal parameters in a function header. E. Pointers whose contents are the address of another pointer. 

Computer Science & Information Technology

The network administrator has been tasked to create a network segment where resources can be placed for public web access. Which of the following should be implemented?

A. DMZ B. Honeynet C. PAT D. Port security

Computer Science & Information Technology