Which of the following is a valid type of role when it comes to data ownership?

A. Data owners
B. Data custodians
C. Data users
D. All of the above


Answer: D

Computer Science & Information Technology

You might also like to view...

Allowing users to decide which mobile code to run is the best way to resolve weaknesses introduced with mobile code.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Wireless network devices use ________ to communicate with each other

A) satellites B) radio waves C) fiber optics D) DSL

Computer Science & Information Technology

To use data from two tables, you must create a ________ between them

Fill in the blank(s) with correct word

Computer Science & Information Technology

Which function is best suited to return the specified number of characters from the end of a text string?

A) LEFT B) RIGHT C) MID D) TRIM

Computer Science & Information Technology