Use for business communications only and the disallowing of the transmission of confidential business information are recommended guidelines for _______
a. Desktop configuration
b. Instant messaging
c. USB drives
d. None of the above
Answer B. The organizational guidelines for instant messaging should be strict.
Computer Science & Information Technology
You might also like to view...
In 2003 the _________ exploited a buffer overflow in Microsoft SQL Server 2000.
A. Slammer worm B. Morris Internet Worm C. Sasser worm D. Code Red worm
Computer Science & Information Technology
When a variable is first assigned a value, it is said to be __________.
Fill in the blank(s) with correct word
Computer Science & Information Technology