Different types of hardware can be secured in different ways, but one of the most important ways is to ____.

A. never update once you have a good configuration defined
B. buy products from the same brand
C. only use on network administrator
D. choose good passwords that you then guard closely


Answer: D

Computer Science & Information Technology

You might also like to view...

When a __________ method or block is running on an object, the object is locked so no other such method can run on that object at the same time.

a. synchronized b. shared c. thread d. writeable

Computer Science & Information Technology

The main reason to split an Access database is to improve development and maintenance

Indicate whether the statement is true or false

Computer Science & Information Technology

Which is not a key factor a programmer uses in selecting the language for a project?

A. Type of target application B. Number of inputs required C. Speed required D. Space required

Computer Science & Information Technology

When a data flow diagram (DFD) is exploded, the lower-level diagram is referred to as the parent diagram.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology