24 % 5 is _____
a. 1
b. 2
c. 3
d. 4
e. 0
d
Computer Science & Information Technology
You might also like to view...
iOS refers to
A) An integrated operating system B) An Internet operating system that allows modifications C) A closed source or vendor-specific operating system D) A type of operating system that does allow modifications
Computer Science & Information Technology
What security control may be used to implement a concept known as two-person control?
A. Mandatory vacation B. Separation of duties C. Least privilege D. Defense in depth
Computer Science & Information Technology