Not permitting the computer programmer to enter the computer room is an example of _______________________________.

What will be an ideal response?

segregation of duties

PTS: 1

Computer Science & Information Technology

You might also like to view...

A teardrop attack involves sending a forged packet to the victim

Indicate whether the statement is true or false.

Computer Science & Information Technology

What are two requirements for a hash function?

What will be an ideal response?

Computer Science & Information Technology