Limiting what can be done to the data or application makes up the integrity component of security
Indicate whether the statement is true or false
TRUE
You might also like to view...
The following information applied to Michaels Company for 2014: Merchandise purchased for resale ..................... $400,000 Freight-in ........................................... 7,500 Interest on notes payable to vendors ................. 3,000 Purchase returns ..................................... 2,500 Michaels' inventoriable cost for 2014 was
a. $409,000. b. $407,500. c. $406,000. d. $405,000
Steve Perez, a senior manager at Lanset Inc., is satisfied to contribute to his organization in spite of receiving a lower salary than what other organizations might offer him. Steve's attitude reflects his
A. organizational commitment. B. authoritarian behavior. C. negative affectivity. D. selective perceptions. E. locus of control.
Rafi, a director of Super Service Station Corporation, does not attend a board meet¬ing for three years. During that time, Twyla, Super's president, makes improper loans that cost the company $100,000. Rafi is most likely
a. liable for negligence or mismanagement. b. liable for violation of the business judgment rule. c. not liable because missing meetings is an honest mistake. d. not liable because missing meetings is only poor judgment.
Reference group influence is likely to be greater for products that will not be seen by other individuals.
Answer the following statement true (T) or false (F)