Which of the following represent appropriate steps to protecting data?
A) restrict use to authorized persons for approved purposes
B) decript sensitive data
C) protect passwords or other codes
D) both A & B
D
Computer Science & Information Technology
You might also like to view...
The ____ includes the criteria that will be used to determine whether the change was successful.
A. SLA B. RPO C. SOW D. SOC
Computer Science & Information Technology
Which of the following splay tree rotations in effect distinguishes it from rotate-to-root?
a. zig only b. zig-zag only c. zig-zig only d. zig-zig and zig-zag only e. all of the above
Computer Science & Information Technology
If you declare an array double[] list = {3.4, 2.0, 3.5, 5.5}, list[1] is ________.
a. 3.4 b. 2.0 c. 3.5 d. 5.5 e. undefined
Computer Science & Information Technology
Pixel is short for ________
Fill in the blank(s) with correct word
Computer Science & Information Technology