Passwords, Internet use, email attachments, software installation, instant messaging, and desktop configuration are areas of ______
a. Computer policies
b. User policies
c. Documentation
d. Network policies
Answer B.
Computer Science & Information Technology
You might also like to view...
Configuring a firewall to ignore all incoming packets that request access to a specific port is known as ________
A) packet switching B) static addressing C) packet filtering D) logical port blocking
Computer Science & Information Technology
A linked object becomes a part of the destination file
Indicate whether the statement is true or false
Computer Science & Information Technology