Which of the following represent appropriate steps to protecting data?

A) restrict use to authorized persons for approved purposes
B) decript sensitive data
C) protect passwords or other codes
D) both A & B


D

Computer Science & Information Technology

You might also like to view...

The ____ includes the criteria that will be used to determine whether the change was successful.

A. SLA B. RPO C. SOW D. SOC

Computer Science & Information Technology

Which of the following splay tree rotations in effect distinguishes it from rotate-to-root?

a. zig only b. zig-zag only c. zig-zig only d. zig-zig and zig-zag only e. all of the above

Computer Science & Information Technology

If you declare an array double[] list = {3.4, 2.0, 3.5, 5.5}, list[1] is ________.

a. 3.4 b. 2.0 c. 3.5 d. 5.5 e. undefined

Computer Science & Information Technology

Pixel is short for ________

Fill in the blank(s) with correct word

Computer Science & Information Technology