The process of assigning financial value or worth to each information asset is known as __________.

A. probability estimate
B. cost estimation
C. risk acceptance premium
D. asset valuation


Answer: D

Computer Science & Information Technology

You might also like to view...

The longest path through a PERT diagram is called:

A) slack time. B) the precedent activity path. C) maximum path time. D) the critical path.

Computer Science & Information Technology

____________________ software examines the files stored on a disk to determine whether they are infected with a virus, and then destroys or disinfects them.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

What kinds of images are based on mathematical instructions that define lines, curves, text, ovals, and other geometric shapes?

a. Bitmap images b. Metafile graphics c. Vector graphics d. Line-art images

Computer Science & Information Technology

The ____ statement is similar to the break statement but applies only to loops created with while, do-while, and for statements.

A. stop B. loop C. exit D. continue

Computer Science & Information Technology