Formula auditing replaces known errors with alternate values.
Answer the following statement true (T) or false (F)
False
You might also like to view...
Computers store information in ________ (Base 2), which is difficult, if not impossible for humans to read
Fill in the blank(s) with correct word
A report formatted so that the data can be printed on a sheet of labels is called a(n) ________ report
Fill in the blank(s) with correct word
Sara, an employee, tethers her smartphone to her work PC to bypass the corporate web security gateway while connected to the LAN. While Sara is out at lunch her PC is compromised via the tethered connection and corporate data is stolen. Which of the following would BEST prevent this from occurring again?
A. Disable the wireless access and implement strict router ACLs B. Reduce restrictions on the corporate web security gateway C. Security policy and threat awareness training D. Perform user rights and permissions reviews
A _____ consists of senior managers representing the business and information technology organizations—to provide guidance and support to the project.
a. quality control team b. project steering team c. scope management team d. project development team