The principles that should be followed for personnel security are: limited reliance on key employees, separation of duties, and _______.
Fill in the blank(s) with the appropriate word(s).
least privilege
Computer Science & Information Technology
You might also like to view...
The maximum number of significant digits is called the ____________________.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
Choose the sentence type of the following sentence.Rinji uses a debit card, and Nikki pays by check.?
A. ?Simple B. ?Compound C. ?Complex D. ?Compound-complex
Computer Science & Information Technology