Guidelines to follow when determining data entry and storage considerations include all of the following
A. data should be entered into the system where and when it occurs
B. data should be verified when it is entered
C. data duplication should be encouraged
D. data should be entered into a system only once
Ans: A. data should be entered into the system where and when it occurs
B. data should be verified when it is entered
C. data duplication should be encouraged
D. data should be entered into a system only once
You might also like to view...
Answer the following statements true (T) or false (F)
1. Under the Intel architecture, a task consists of a task state segment (TSS). 2. In the Intel architecture, the task execution space holds the code, stack, and data segments. 3. Memory protection helps to prevent one task from accidentally or intentionally changing the contents of memory assigned to another task. 4. In the Intel architecture, limit checking ensures that only code, data, or stack segment descriptors are used and that they are used as intended. 5. On a Pentium, privilege level 3 has the highest priority.
Explore the /proc file system and find out the kind of data a normal user can access. Why is it useful to be able to read this data?
What will be an ideal response?
A bar chart does not include a vertical (Y) axis
Indicate whether the statement is true or false
According to the Organization for Internet Safety (OIS), which of the following steps for a threat response process does the organization verify the attack?
A. Notification B. Investigation C. Resolution: D. Discovery