The ____ policy dictates how and in what timeframe spam is removed.

A. data access
B. data loss
C. data security
D. data retention


Answer: D

Computer Science & Information Technology

You might also like to view...

Which of the following protocols does not share a similar frame format?

a. HDLC b. SDLC c. PPP d. BSC

Computer Science & Information Technology

Parsed character data includes _____.

A. comments B. empty element tags C. processing instructions D. all of the above

Computer Science & Information Technology

What is a permission?  Provide examples of permissions for database access.

What will be an ideal response?

Computer Science & Information Technology

If a key pair is generated at a local computer, it is considered to be decentralized

Indicate whether the statement is true or false

Computer Science & Information Technology