Use for business communications only and the disallowing of the transmission of confidential business information are recommended guidelines for _______

a. Desktop configuration
b. Instant messaging
c. USB drives
d. None of the above

Answer B. The organizational guidelines for instant messaging should be strict.

Computer Science & Information Technology

You might also like to view...

In 2003 the _________ exploited a buffer overflow in Microsoft SQL Server 2000.

A. Slammer worm B. Morris Internet Worm C. Sasser worm D. Code Red worm

Computer Science & Information Technology

When a variable is first assigned a value, it is said to be __________.

Fill in the blank(s) with correct word

Computer Science & Information Technology