Which of the following is a valid type of role when it comes to data ownership?
A. Data owners
B. Data custodians
C. Data users
D. All of the above
Answer: D
Computer Science & Information Technology
You might also like to view...
Allowing users to decide which mobile code to run is the best way to resolve weaknesses introduced with mobile code.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
Wireless network devices use ________ to communicate with each other
A) satellites B) radio waves C) fiber optics D) DSL
Computer Science & Information Technology
To use data from two tables, you must create a ________ between them
Fill in the blank(s) with correct word
Computer Science & Information Technology
Which function is best suited to return the specified number of characters from the end of a text string?
A) LEFT B) RIGHT C) MID D) TRIM
Computer Science & Information Technology