COGNITIVE ASSESSMENT
Which of the following best describes function creep?

A. When a user accesses data without authorization
B. When spyware collects and transmits data from a database
C. When a company uses the technology intended for one purpose for a different purpose
D. When a project's features keep being added to during development


Answer: C

Computer Science & Information Technology

You might also like to view...

Name the four keywords associated with a switch statement.

What will be an ideal response?

Computer Science & Information Technology

Missing objects in a database can be restored from a ________

A) backup B) template C) Form Wizard D) control

Computer Science & Information Technology

_____ cases are usually used for office or home PCs where the requirements for additional internal devices and adapter cards is limited.

A. Full tower B. Mid tower C. Slimline D. Mini tower

Computer Science & Information Technology

What occurs between steps A and B?

A. The KDC verifies the validity of the TGT and whether the user has the right privileges for the requested resource. B. The KDC updates its access control list based on the data in the TGT. C. The KDC checks its service listing and prepares an updated TGT based on the service request. D. The KDC generates a service ticket to issue to the client.

Computer Science & Information Technology