With change control in place, changes usually have to pass through ________
A) the disaster recovery team B) IT
C) upper management D) the change control board
D
Computer Science & Information Technology
You might also like to view...
What is the second step in the Security System Development Life Cycle?
A. Acquire/Develop B. Implement or Assess C. Operate/Maintain D. Dispose
Computer Science & Information Technology
When the ____________________ reports that the end tag for an element is missing, this indicates that either a two-sided tag is missing an end tag or a one-sided tag was improperly entered.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology