Security threats can originate from ________.
a) malicious users
b) malicious software
c) outside the system via a network connection
d) all of the above
d) all of the above
Computer Science & Information Technology
You might also like to view...
Files created in Access 2013 are saved with the Access 2010 file format, which displays in the title bar
Indicate whether the statement is true or false
Computer Science & Information Technology
What component allows multiple computers to share a keyboard?
A) UPS B) KVM C) Docking station D) Projector
Computer Science & Information Technology