Which of the following represent appropriate steps to protecting data?
A) restrict use to authorized persons for approved purposes
B) decript sensitive data
C) protect passwords or other codes
D) both A & B
D
Computer Science & Information Technology
You might also like to view...
What are the three basic marketing objectives that are applied to blogs?
a. Inform, entertain, become profitable b. Inform, persuade, remind c. Notify, educate, persuade d. Recommend, become profitable, notify
Computer Science & Information Technology
A new calculated field name must be enclosed in brackets
Indicate whether the statement is true or false
Computer Science & Information Technology