The process of assigning financial value or worth to each information asset is known as __________.
A. probability estimate
B. cost estimation
C. risk acceptance premium
D. asset valuation
Answer: D
You might also like to view...
The longest path through a PERT diagram is called:
A) slack time. B) the precedent activity path. C) maximum path time. D) the critical path.
____________________ software examines the files stored on a disk to determine whether they are infected with a virus, and then destroys or disinfects them.
Fill in the blank(s) with the appropriate word(s).
What kinds of images are based on mathematical instructions that define lines, curves, text, ovals, and other geometric shapes?
a. Bitmap images b. Metafile graphics c. Vector graphics d. Line-art images
The ____ statement is similar to the break statement but applies only to loops created with while, do-while, and for statements.
A. stop B. loop C. exit D. continue